CN101682503A - Image encrypting device, image decrypting device, method and program - Google Patents

Image encrypting device, image decrypting device, method and program Download PDF

Info

Publication number
CN101682503A
CN101682503A CN200780053113A CN200780053113A CN101682503A CN 101682503 A CN101682503 A CN 101682503A CN 200780053113 A CN200780053113 A CN 200780053113A CN 200780053113 A CN200780053113 A CN 200780053113A CN 101682503 A CN101682503 A CN 101682503A
Authority
CN
China
Prior art keywords
image
key
encryption
unit
public
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200780053113A
Other languages
Chinese (zh)
Inventor
阿南泰三
仓木健介
中潟昌平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Publication of CN101682503A publication Critical patent/CN101682503A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/88Medical equipments

Abstract

An image encrypting device according to the present invention generates a finally encrypted image sequentially by converting an image of a specified region in an input image with an encryption key, byembedding information obtained by encrypting the encryption key with a public key pairing with the private key of a transmission destination, and by performing pixel value conversion. Then, the encrypted image is transmitted to the transmission destination as a printed matter or via a network. An image decrypting device according to the present invention converts the encrypted image in the form of print data or electronic data into an image, and inputs the image. Next, the image decrypting device extracts a decryption key (the encryption key) from the image of the encryption region by executing a process reverse to the process of the image encrypting device according to the present invention for the encryption region of the encrypted image converted into the image data. Then, the image decrypting device decrypts the original image of the encrypted region by using the decryption key, and restores the entire encrypted image.

Description

Image encrypting apparatus, image decrypting device, method and program
Technical field
The present invention relates to be used for exchanging safely important informations such as personal information have been carried out the printing thing of visual cryptography or the technology of electronic data.
Background technology
Along with the development of social informatization, the leakage of security information becomes deep problem, prevents that the importance of the technology of information leakage from increasing.About this information leakage technology, for example develop the following technology that data are encrypted:, also can't learn its content even the third party obtains numerical data.This encryption technology is as preventing that the effective means of the information leakage of numerical data is utilized.
On the other hand, prevent that the technology of the information leakage of the printing thing printed from also fully not establishing on paper medium etc., also do not have the example of practicability.In modern society, having only about half of information leakage is by printing such statistics that thing causes, same with numerical data, and the thing exploitation is a kind of to prevent that the technology of information leakage from being the task of top priority at printing.
As the concrete example of the printing thing of expecting the information leakage countermeasure, the list of results of the detail form of the bill when having commodity to buy, credit card etc., the case history of hospital, school, register etc.According to the JP/2007/000215 (hereinafter referred to as patent documentation 1) of PCT application, not only digital picture can also be encrypted the image of printing on paper and be prevented information leakage.But the case history of the hospital of printing on paper and detail form etc. can be defined as a kind of visual information.Therefore, in the application's specification (this specification), it is referred to as " image ".
The summary of patent documentation 1 disclosed image encryption is described.
About the input picture 10 shown in Fig. 1 (A), specify its part as encrypting zone 11, use encryption key that the image in this encryption zone 11 is encrypted.Its result generates the encrypted image 20 shown in Fig. 1 (B).In encrypted image 20, encrypt being equivalent to described zone 21 of encrypting zone 11, can't visually carry out interpretation.
In the encryption of above-mentioned input picture, handle the processing of encrypting itself by numerical data, so encrypted image is a numerical data.Afterwards, this encrypted image can be printed on paper medium etc., also can directly exchange in the mode of numerical data.The invention of patent documentation 1 is characterised in that, can the encrypted image of once printing, promptly be transformed to analog digital data be decrypted once more.
In the invention of patent documentation 1, in the encryption and decryption of image, use public keys (same key).Therefore, need independent transmission destination to send and be used to decipher the key of this enciphered message to enciphered message.Therefore, this decruption key may be stolen by the third party, existing problems aspect fail safe.
But, construct powerful certificate server, use electronic identification system that this certificate server exchanges public keys safely practicability, but, the mode of this use certificate server structurally has a great difference with the simple and easy Verification System of general personal user's purposes of popularizing, so the user of technology that can enjoy the invention of patent documentation 1 is restricted.
Patent documentation 1:PCT/JP2007/000215
Summary of the invention
The objective of the invention is to, do not change existing key management system, anyone can both be easily and exchanges the employed public keys of deciphering of the encrypted image that generates by encryption technology safely.
Image encrypting apparatus of the present invention is a prerequisite with the image encrypting apparatus that image is encrypted.
The 1st mode of image encrypting apparatus of the present invention has: input unit, encrypt regional designating unit, image transforming unit, public-key cryptography and obtain unit, secret key encryption unit, information and embed unit, pixel value converter unit and output unit.
Described input unit input is as the view data of cryptographic object.The regional designating unit of described encryption is specified the zone as cryptographic object at the image that is generated by this input unit.Image transforming unit uses encryption key to be transformed to the 1st image by this encryption zone of encrypting regional designating unit appointment.Public-key cryptography is obtained the public-key cryptography of transmission destination that the data of described cryptographic object are obtained in the unit.The use of secret key encryption unit obtains the public-key cryptography of obtaining the unit by the disclosure key described encryption key is encrypted.Information embeds the unit encryption key related information is embedded in described the 1st image, and described encryption zone is transformed to the 2nd image, and wherein, this encryption key related information is and the relevant information of encryption key of being encrypted by this secret key encryption unit.The pixel value of described the 2nd image of pixel value converter unit conversion so that can determine zone by the regional designating unit appointment of described encryption, is transformed to the 3rd image with described encryption zone.Output unit is exported encrypted image with prescribed manner, and wherein, this encrypted image is for being that described the 3rd image obtains with described image transform of encrypting the zone in by the image of described input unit input.
The 1st mode according to image encrypting apparatus of the present invention, generation/output is the encrypted image of the data (information) in the encryption zone in the encryption key related information embedded images with the information relevant with encryption key, so, between the transmit leg and reception destination of this encrypted image, can exchange safely and restore the needed decruption key of this encrypted image.And, described encryption key related information is the relevant information of encryption key with the public key encryption of reception destination by encrypted image, so what take out described decruption key (equaling described encryption key) according to described encryption key related information is that the person of possessing with the paired privacy key of described public-key cryptography is the recipient of encrypted image.Therefore, even the third party obtains this encrypted image, can't restore it, the content of the information behind the image encryption can not revealed to the third party yet.
The 2nd mode of image encrypting apparatus of the present invention is a prerequisite in the 1st mode of above-mentioned image encrypting apparatus of the present invention, and described encryption zone designating unit is specified a plurality of encryptions zone.And described image transforming unit is used a plurality of encryption keys described a plurality of each regional image of encrypting the zone of conversion respectively.And described public-key cryptography is obtained the unit and is obtained a plurality of public-key cryptography.Described secret key encryption unit uses and obtains a plurality of public-key cryptography that the unit is obtained by described public-key cryptography, respectively employed each encryption key of image in each encryption zone of described image transforming unit conversion is encrypted.
According to the 2nd mode of image encrypting apparatus of the present invention, for example, can carry out image encryption to a plurality of information at a file.Therefore, in the encryption of wishing the file that information encrypted is disperseed, be effective.
The 3rd mode of image encrypting apparatus of the present invention is a prerequisite with the image encrypting apparatus of above-mentioned the 2nd mode of the present invention, described image transforming unit use encryption key independently to come conversion respectively each encrypts the image in zone.
According to the 3rd mode of image encrypting apparatus of the present invention, use encryption key independently that each is encrypted the zone, is that the image of each information is encrypted, so the intensity of fail safe improves.
The 4th mode of image encrypting apparatus of the present invention is a prerequisite with the 2nd or the 3rd image encrypting apparatus of above-mentioned image encrypting apparatus, and it is public-key cryptography of a plurality of transmissions destination that described public-key cryptography is obtained a plurality of public-key cryptography of obtaining the unit.
The 5th mode of image encrypting apparatus of the present invention is a prerequisite with the image encrypting apparatus of the arbitrary mode in the 2nd of above-mentioned image encrypting apparatus~4th, and described public-key cryptography is obtained the unit and obtained and the identical public-key cryptography of described a plurality of encryption region quantities.
The 6th mode of image encrypting apparatus of the present invention is a prerequisite with the image encrypting apparatus of the 1st or the 2nd mode of above-mentioned image encrypting apparatus, and described output unit utilizes the public-key cryptography of described transmission destination that described encrypted image is encrypted back output.
The 7th mode of image encrypting apparatus of the present invention is a prerequisite with the image encrypting apparatus of the 1st or the 2nd mode of above-mentioned image encrypting apparatus, described secret key encryption unit uses described public-key cryptography and described transmission destination will submit the other side's of described encrypted image privacy key to, and described encryption key is encrypted.
The 8th mode of image encrypting apparatus of the present invention is a prerequisite with the image encrypting apparatus of the 1st or the 2nd mode of above-mentioned image encrypting apparatus, and described input unit is imported described encryption key.
The 9th mode of image encrypting apparatus of the present invention is a prerequisite with the image encrypting apparatus of the arbitrary mode in the 1st of above-mentioned image encrypting apparatus~the 8th mode, and described public-key cryptography is obtained the unit and obtained described public-key cryptography from the public-key cryptography management server that described public-key cryptography is managed.
In arbitrary mode in the 1st of image encrypting apparatus of the present invention~the 9th mode, described output unit also can constitute, the described encrypted image of printout.Perhaps, described output unit also can constitute, and described encrypted image is transformed to extended formatting exports.Perhaps, described output unit also can constitute, and sends described encrypted image via network.In this network sends, for example also can send described encrypted image by Email.
Image decrypting device of the present invention is that the image decrypting device of original image is a prerequisite with the encrypted image deciphering that will comprise the image after the encryption.
The 1st mode of image decrypting device of the present invention has: input unit, encrypted location detecting unit, pixel value converter unit, information extraction unit, this information extraction unit, cipher key decryption unit and image transforming unit.
Input unit is imported described encrypted image as view data.The encrypted location detecting unit is resolved the described encrypted image of this input unit input, detects the position of encrypting the zone in the described encrypted image, and this encryption zone is the zone of in described encrypted image image being encrypted.The pixel value converter unit makes the pixel value before the described pixel value of encrypting the image in zone reverts to conversion, determines described position of encrypting the zone with basis by the detected described positional information of encrypting the zone of this encrypted location detecting unit.Information extraction unit is extracted the encryption key related information from the described image of encrypting the zone that is generated by this pixel value converter unit, this encryption key related information is and embeds the relevant information of encryption key in the described image of encrypting the zone.Cipher key decryption unit is used and the 1st paired privacy key of the 1st public-key cryptography, according to described encryption key related information, be decrypted deciphering the described employed decruption key of image of encrypting the zone, wherein, the 1st public-key cryptography is that the generation of the described encryption key related information that extracted by this information extraction unit is employed.Image transforming unit uses the decruption key by this cipher key decryption unit deciphering that the described image of encrypting the zone is decrypted, and described original image is decrypted.
According to the 1st mode of image decrypting device of the present invention, the image that can extract from encrypted image encrypting the zone is decrypted needed decruption key, this encrypted image is restored be original image.
The 2nd mode of image decrypting device of the present invention is a prerequisite in the 1st mode of above-mentioned image decrypting device, the privacy key that the transmission destination that described the 1st privacy key is described encrypted image is possessed, described the 1st privacy key are will submit to the other side of described encrypted image to decipher the paired privacy key of employed the 2nd public-key cryptography of described encrypted image with described transmission destination.
According to the 2nd mode of image decrypting device of the present invention, can be original image with utilizing the encrypted image that sends the secret key encryption of possessing the destination to restore.
The 3rd mode of image decrypting device of the present invention is a prerequisite in the 1st or the 2nd mode of above-mentioned image decrypting device, described image decrypting device also has public-key cryptography and obtains the unit, under the situation of described encryption key related information being encrypted by described the 1st public-key cryptography and the 2nd privacy key, the disclosure key is obtained the unit and is obtained 2nd public-key cryptography paired with described the 2nd privacy key.And described secret key encryption unit uses described the 1st privacy key and described the 2nd public-key cryptography that described decruption key is decrypted according to described encryption key related information.
The 3rd mode according to image decrypting device of the present invention, can from encrypted image, extract and use the 1st public-key cryptography and the 2nd privacy key to encrypt the image of encrypting the zone to be encrypted employed encryption key and the encryption key related information that obtains, from this encryption key related information, take out described encryption key (equaling decruption key).And, can use this decruption key that encrypted image is restored and be original image.
The 4th mode of image decrypting device of the present invention is a prerequisite with the image decrypting device of the 1st or the 2nd mode of above-mentioned image decrypting device, and described encryption zone is a plurality of.
According to the 4th execution mode of image decrypting device of the present invention, can be original image with having a plurality of encrypted images recoveries of encrypting the zone.
The 5th mode of image decrypting device of the present invention is a prerequisite in the 4th mode of above-mentioned image decrypting device, and each each encryption key related information that image comprised of encrypting the zone is independently relevant with encryption key information.Described information extraction unit is extracted independently encryption key related information from described respectively the encryption the zone.And, described cipher key decryption unit is according to each the encryption key related information that is extracted by described information extraction unit, the paired public-key cryptography of the employed privacy key of generation of use and each encryption key related information embeds regional employed each decruption key of image of each encryption that described each encryption key related information is arranged to deciphering and is decrypted.
According to the 5th mode of image decrypting device of the present invention, can will utilize encryption key independently that a plurality of encrypted images of encrypting in the zone of encrypting are restored and are original image.
The 6th mode of image decrypting device of the present invention is a prerequisite in the 5th mode of above-mentioned image decrypting device, and described each encryption key related information is by independently privacy key generation.
According to the 6th mode of image decrypting device of the present invention, can restore and be original image generate the encrypted image that is embedded into the encryption key related information in the encrypted image by privacy key independently.
The 7th mode of image decrypting device of the present invention is a prerequisite with the image decrypting device of the arbitrary mode in the 1st of above-mentioned image decrypting device~the 5th mode, and described public-key cryptography is obtained the unit and obtained described public-key cryptography from the public-key cryptography management server that described public-key cryptography is managed.
In the image decrypting device of the arbitrary mode in the 1st of above-mentioned image decrypting device~the 7th mode, described encrypted image for example is to print the image printed on the thing or the image of prescribed form etc.And, also can constitute and receive described encrypted image via network.In this network receives, for example receive described encrypted image by Email.
In the image decrypting device of said structure, described encrypted image also can be the image that generates by described image encrypting apparatus.
According to the present invention, can will exchange in the employed public keys of the encryption and decryption of encrypted image (encryption key and decruption key) the embedding encrypted image.Therefore, the high invisible important information of requirements such as personal information is carried out image encryption, when exchanging this important information,, also can exchange public keys safely by encrypted image even do not import Verification System with general certificate server of popularizing etc. by encrypted image.Under this situation, also encrypted image can be printed on the paper medium,, guarantee that the fail safe of height exchanges important information and public keys both sides, and can not stolen by the third party by printing thing.And, utilize the public-key cryptography that sends the destination that public keys is encrypted, will embed by the encryption key related information that this encryption obtains in the encrypted image, thus, the mode of encryption and authenticate himself can be expanded on the paper medium.Certainly, the present invention can also embed the encrypted image that this encryption key related information is arranged with the form of electronic data via exchanges such as network or recording mediums.
Description of drawings
Fig. 1 is the figure that an example of image encryption is shown.
Fig. 2 is the figure that the basic structure of image encrypting apparatus of the present invention is shown.
Fig. 3 is the figure that the basic structure of image decrypting device of the present invention is shown.
Fig. 4 is the figure that the structure of the 1st execution mode of having used application system of the present invention is shown.
Fig. 5 is the figure (its 1) that the structure and the method for the 2nd execution mode of having used application system of the present invention are shown.
Fig. 6 is the figure (its 2) that the structure and the method for the 2nd execution mode of having used application system of the present invention are shown.
Fig. 7 is the figure (its 3) that the structure and the method for the 2nd execution mode of having used application system of the present invention are shown.
Fig. 8 is the figure (its 4) that the structure and the method for the 2nd execution mode of having used application system of the present invention are shown.
Fig. 9 illustrates the structure of the 3rd execution mode of having used application system of the present invention and the figure of method.
Figure 10 illustrates as the hardware configuration of the personal computer of encryption device performance function of the present invention and the figure of software configuration.
Figure 11 is the flow chart that CPU that personal computer shown in Figure 10 is shown carries out the image encryption processing that the program that is stored in carries out with the program in the storage area.
Figure 12 is the figure that an example of ciphered data (enciphered data) is shown.
Figure 13 is the figure of designation method in encryption zone that the enciphered data of Figure 12 is shown.
Figure 14 is the figure that the state after the image transform in encryption zone of Figure 13 is shown.
Figure 15 is the figure that the image state in the encryption zone after the processing of carrying out in the image in encryption zone shown in Figure 14 embedding the encryption key related information is shown.
Figure 16 illustrates the figure that image to encryption zone shown in Figure 14 carries out the image state in the encryption zone after the pixel value conversion process.
Figure 17 illustrates as the hardware configuration of the personal computer of image decrypting device performance function of the present invention and the figure of software configuration.
Figure 18 is the flow chart that illustrates as the treatment step of the personal computer of the image decrypting device performance function of Figure 17.
Embodiment
Below, with reference to the description of drawings embodiments of the present invention.
The basic structure of image encrypting apparatus of the present invention at first, is described.
{ basic structure of image encrypting apparatus of the present invention }
Fig. 2 is the figure that the basic structure of image encrypting apparatus of the present invention is shown.
Image encrypting apparatus 40 of the present invention has: input unit 41, the regional designating unit 42 of encryption, image transforming unit 43, public-key cryptography are obtained unit 44, secret key encryption unit 45, information embedding unit 46, pixel value converter unit 47 and output unit 48.
Input unit 41 inputs are transformed to image (being called input picture later on) as the data of cryptographic object with it.This input picture for example is the image of bitmap form.Be input to data in the input unit 41 and for example be file data, the data of PDF (PortableDocument Format) form or the data of HTML (Hyper Text Transfer Protocol) form etc. that the software (soft) by word processor generates.Input unit 41 is transformed to the image (view data) of bitmap form etc. with part or all of these data.In addition, be input to the view data that data in the input unit 41 also can be the printing things that read by scanner etc.
Input unit 41 is also imported the part of above-mentioned image is encrypted employed encryption key.This encryption key for example can be the Biont information that the password via GUI (Graphical User Interface) input, the organism authentication apparatus that is stored in key in the ID card or fingerprint, vein, iris etc. use when authenticating.
Encrypting regional designating unit 42 specifies from the part of the image of input unit 41 outputs, promptly wishes the zone of encrypting this image.For example carry out the appointment in this encryption zone via GUI.And,, then also can encrypt the zone by appointments in advance such as coordinate informations if described image is the data of set form.Specified encryption zone is not limited to 1, certainly is a plurality of.
Image transforming unit 43 is used the encryption key via input unit 41 inputs, to being encrypted by the zone of encrypting regional designating unit 42 appointments (encrypting the zone) from the image of input unit 41 outputs.For example carry out this encryption by the disclosed method of the invention of described patent documentation 1.Encrypt by this, can't discern the original picture material in the encryption zone of described input picture.
Public-key cryptography obtain unit 44 via network etc. from the existing server of possessing public-key cryptography, obtain the public-key cryptography of transmission destination of the input picture (being called encrypted image later on) of described encryption.
Secret key encryption unit 45 uses obtains the public-key cryptography that unit 44 is obtained by public-key cryptography, and the encryption key that is input in the input unit 41 is encrypted.Like this, when the encryption key by public key encryption does not use the privacy key that sends the destination, can't decipher.Therefore, even the third party has stolen the encryption key by the disclosure secret key encryption, also can't be decrypted encryption key, so, even the encryption key that embeds in described encrypted image by public key encryption sends, the image in the encryption zone in also can't the described encrypted image of interpretation.
Information embeds the encryption key that will be encrypted by secret key encryption unit 45 unit 46 as image information, embeds in the encrypted image that is generated by image transforming unit 43.
Pixel value converter unit 47 is the method for the invention by described patent documentation 1 for example, and horizontal and vertical with some cycles conversion pixel value at image generates the roughly image of striated pattern.
Output unit 48 will output to printing equipment, image display device or network by the image (for easy, being called final encrypted image) that pixel value converter unit 47 generates, and perhaps be kept in the storage device etc.In this is preserved, also can directly not preserve final encrypted image, and other forms such as file that are transformed to PostScript data or PDF form are preserved.
{ basic structure of image decrypting device of the present invention }
Fig. 3 is the figure that the basic structure of image decrypting device of the present invention is shown.
Image decrypting device 50 of the present invention has: input unit 51, encrypted location detecting unit 52, pixel value converter unit 53, information extraction unit 54, public-key cryptography are obtained unit 55, cipher key decryption unit 56, image transforming unit 57 and output unit 58.But public-key cryptography is obtained unit 55 not necessarily.Only generate under the situation of the encryption key related information in the encrypted image that embedding will decipher, need public-key cryptography to obtain unit 55 at the public-key cryptography of a side that use to generate encrypted image and the privacy key of deciphering a side of this encrypted image.Under this situation, public-key cryptography is obtained unit 55 and is obtained the public-key cryptography paired with this privacy key.
Image decrypting device 50 of the present invention will be restored by the described final encrypted image that above-mentioned image encrypting apparatus 40 generates and be original image (being input to the image in the input unit 41).
The final encrypted image that input unit 51 inputs are generated by image encrypting apparatus 40.
In addition, being input to final encrypted image in the input unit 51 also can be to have read by image encrypting apparatus 40 by scanner etc. to encrypt the final encrypted image of the view data of the printing thing of printing the back.
Encrypted location detecting unit 52 detects the position in the encryption zone in this final encrypted image.If this final encrypted image is to use the method for invention of described patent documentation 1 and the image that generates, then also detect the position of the boundary line in this encryption zone.The method of the invention by described patent documentation 1 is carried out this detection.
Pixel value converter unit 53 carries out the opposite conversion process of pixel value conversion process of carrying out with the pixel value converter unit 47 of image encrypting apparatus 40, removes by the encrypted location detecting unit 52 detected pixel values (restoring original pixel value) of encrypting the zone.
Information extraction unit 54 is at the restored image that is obtained by pixel value converter unit 47, carry out embedding the opposite processing of processing that unit 46 carries out with the information of image encrypting apparatus 40, the information of the encryption key of the described public key encryption of extraction and application from this restored image (, being called encryption key message) for easy.
Public-key cryptography is obtained unit 55 and is obtained public-key cryptography as required.It is same that for example obtain and the public-key cryptography of image encrypting apparatus 40 of the disclosure key obtained unit 44, obtains from the server that the disclosure key is managed.The user that generation is input to the final encrypted image in the input unit 51 encrypts when generating encryption key message encryption key, uses the disclosure key.
Cipher key decryption unit 56 is used with 45 pairs of encryption keys in secret key encryption unit of image encrypting apparatus 40 and is encrypted the paired privacy key of employed public-key cryptography, deciphering/extraction encryption key from the encryption key message that is extracted by information extraction unit 54.
Image transforming unit 57 is used the encryption key that is extracted by cipher key decryption unit 56, and the image in the encryption zone of the input picture that restored image encryption device 40 is encrypted restores this input picture integral body.
The input picture that output unit 58 restores image transforming unit 57 outputs to printing equipment, image display device etc.
By this output, can discern the image in the encryption zone of the input picture of encrypting by image encrypting apparatus 40.
Only possess the user with the paired privacy key of the employed public-key cryptography of generation that embeds the encryption key message in the final encrypted image, can be according to the image in the encryption zone of this final encrypted image reflex original input image that generates by image encrypting apparatus 40.
Therefore, only embedding there are the printing thing or the electronic data of the input picture of this encryption key message to send to the transmission destination, thus, send the destination and can use the privacy key paired with the disclosure key, restore the image in the encryption zone of this input picture, know that the image in this encryption zone is an important information.
As mentioned above, by utilizing image encrypting apparatus 40 of the present invention and image decrypting device 50, utilize the framework of public key encryption mode, safely hope in the input picture is encrypted the employed encryption key of encryption (public keys) of the important information of third party's concealment, do not utilize input picture means in addition to exchange this encryption key, can between legal sender and recipient, exchange the important information in the input picture safely.
The execution mode of the application system (abbreviating application system later on as) of having used image encrypting apparatus of the present invention and image decrypting device then, is described.
(the 1st execution mode of application system }
The 1st execution mode of application system of the present invention is to use system of the present invention in as the exchange of the important information of medium will printing thing.Fig. 4 is the figure that the system configuration of the 1st execution mode of the present invention is shown.
The structure and the action of the system of above-mentioned the 1st execution mode are described with reference to Fig. 4.
In the present embodiment, Mr. A/Ms utilizes image encrypting apparatus of the present invention to carry out the processing of following (a)~(g).
(a) data (file) 60 shown in Mr. A/Ms's printed drawings 4 (a) sends it by mailing to Mr. B/Ms and prints thing.Be located to comprise in this data 60 and do not wish the personal list of information 61 seen by the third party.
(b) under this situation, Mr. A/Ms at first by the input unit 41 of scanner of being connected with personal computer (PC) etc., reads data 60 as image, is taken in the memory of personal computer inside.Then, on the display of personal computer (PC), show this image.Mr. A/Ms is by the encryption zone designating unit 42 of mouse etc., and the image section of specifying personal list of information 61 on the picture of display is as " encrypting the zone ".Then, by image transforming unit 43, use the image 61a (being called personal list of information image 61a later on) of 81 pairs of the encryption keys personal list of information 61 of appointment to encrypt as encrypting zones.For example carry out this encryption by the disclosed method of the invention of described patent documentation 1.By this encryption, personal list of information image 61a is transformed to image transform image 61b.
(c) Mr. A/Ms obtains unit 44 by public-key cryptography, obtains Mr. B/Ms's public-key cryptography 82 from public-key cryptography management server 90.
(d) Mr. A/Ms uses 82 pairs of encryption keys 81 of public-key cryptography of Mr. B/Ms to encrypt by secret key encryption unit 45.For easy, will be called encryption key related information 83 by the enciphered data that this encryption generates.
(e) Mr. A/Ms embeds unit 46 by information, in the encryption zone with described encryption key related information 83 embedded images changing image 61b, generates information embedded images 61c.
(f) Mr. A/Ms implements the pixel value conversion process by pixel value converter unit 47 at information embedded images 61c, generates pixel value changing image 61d.This pixel value conversion process for example is the processing that makes information embedded images 61c chequerization.
(g) Mr. A/Ms is by the data of printer 91 after printing part with personal list of information image 61a on the paper to be transformed to pixel value changing image 61d.Then, to the printing thing (print media) of Mr. B/Ms's mailing from printer 91 printouts.
Mr. B/Ms utilizes image decrypting device of the present invention to carry out the processing of following (h)~(1).
(h) after Mr. B/Ms receives the printing thing of Mr. A/Ms's mailing, be that scanner 93 is taken into the type information of this printing thing as image by input unit 51.The pixel value changing image 61d that this image and Mr. A/Ms generate about equally, so, for easy, this image is called pixel value changing image 61d.
(i) Mr. B/Ms removes the pixel value conversion process (being chequerization) that pixel value changing image 61d is implemented by pixel value converter unit 53 in this example, restores information embedded images 61c according to pixel value changing image 61d.
(j) Mr. B/Ms extracts encryption key related information 83 by information extraction unit 54 from information embedded images 61c.Then, use Mr. B/Ms's privacy key 84, be decrypted according to 83 pairs of encryption keys 81 of encryption key related information.In the process of extracting this encryption key 81, according to information embedded images 61c restored image changing image 61b.
(k) Mr. B/Ms uses encryption key 81 to remove the scramble of image transform image 61b by image transforming unit 57.
(1) removes by above-mentioned scramble, restore personal list of information image 61a according to image transform image 61b.
For example carry out the processing of above-mentioned (i)~(1), at the personal list of information image 61a that shows on the display of Mr. B/Ms's personal computer after restoring by the personal computer that Mr. B/Ms possessed.
As mentioned above, Mr. B/Ms can restore the personal list of information behind the image encryption according to the printing thing of Mr. A/Ms's mailing.
In the system of the 1st execution mode, utilize the personal list of information of the data that 81 couples of Mr. A/Mies of encryption key send to Mr. B/Ms to carry out image encryption, utilize 82 pairs of encryption keys 81 of public-key cryptography to encrypt, embed among the information embedded images 61c as encryption key related information 83.Therefore, when Mr. B/Ms posts the printing thing of pixel value changing image 61d, fall into third party's hand even print thing midway in its mailing Mr. A/Ms, this third party also is difficult to decipher personal list of information, can't know the content of personal list of information.
{ the 2nd execution mode of application system }
Above-mentioned the 1st execution mode is to use example of the present invention in the image encryption of printing thing.In the 1st execution mode, only a zone of the image of data is encrypted.
In the 2nd execution mode of the application system of having used image encrypting apparatus of the present invention and image decrypting device, a plurality of zones on the image are encrypted.In this is encrypted, utilize independently encryption key that each regional image is encrypted.And, utilize independently public-key cryptography that the employed encryption key of the encryption in each zone is encrypted respectively, will embed by the encryption key related information that this encryption obtains in the image after encrypting above-mentioned each zone.
Fig. 5~Fig. 8 illustrates the structure of the 2nd execution mode of having used application system of the present invention and the figure of method.
The 2nd execution mode is the system of the present invention that uses in the image encryption of the case of hospital.In the system that has used present embodiment, A hospital management patient's case, the patient of A hospital is allowed to utilize the case of Web (World Wide Web) reading oneself.Therefore, the patient of A hospital can utilize explorer the case of oneself downloaded in personal computer etc. with A hospital takes care of.Here, A hospital thinks that the patient wishes to allow the doctor to other hospitals (being made as B hospital here) of selecting as second suggestion to submit the case of A hospital to.And, think and wish to utilize paper spare to submit case to.But, include the information of not wishing patient self is seen but the doctor of B hospital being seen in the case of A hospital.Here, from the viewpoint of protection personal information, the case of A hospital must prevent information leakage.
Is the system of the present embodiment of prerequisite with reference to Fig. 5~Fig. 8 explanation with above condition.
The processing of<A hospital 〉
At first, describe according to Fig. 5.Fig. 5 is the figure that the treatment step of A hospital side is shown.A hospital utilizes image encrypting apparatus of the present invention to carry out the processing of following (a)~(g).
(a) A hospital makes patient's case image conversion, generates the original image 100 (being called case original image 100 later on) of case.Include the image 101 (being called patient's personal information image 101 later on) of patient's personal information in the case original image 100 and comprise the image 102 (being called information for hospital image 102 later on) of information for hospital of patient's diagnostic result etc.Generate this case original image 100 by input unit 41.
(b) A hospital obtains (obtaining) patient's the public-key cryptography 1 34 (the 1st public-key cryptography) and the public-key cryptography 135 (the 2nd public-key cryptography) of B hospital from public-key cryptography management server 190.Obtain unit 44 by public-key cryptography and carry out the acquisition of the disclosure key.
(c) in case original image 100, utilize encryption key (public keys) 131 (the 1st encryption key) that (patient sees also harmless) patient's personal information image 101 is encrypted, utilize encryption key (public keys) 132 (the 2nd encryption key) that (do not wish patient see but need the doctor of B hospital to see) information for hospital image 102 is encrypted.Thus, about case original image 100, the image that generates after patient's personal information image 101 and information for hospital image 102 these two parts of images are encrypted is image transform image 100a.Carry out the generation of this image transform image 100a by image transforming unit 43.Here, the information for hospital image 102 after patient's personal information image after the encryption in the image transform image 100a 101 and the encryption is called patient's personal information encrypted image 101a and information for hospital encrypted image 102a.Generate this image transform image 100a by image transforming unit 43.
(d) encryption key 131 patients see also harmlessly, so utilize patient's public-key cryptography 133 to encrypt, encryption key 132 does not wish that the patient sees, so utilize the public-key cryptography 135 of B hospital to encrypt.Carry out these encryptions by secret key encryption unit 45.
(e) the relevant information (the 2nd encryption key related information 142) of information (the 1st encryption key related information 141) that the encryption key encrypted with the public-key cryptography 133 that utilizes the patient 131 is relevant and the encryption key encrypted with the public-key cryptography 135 that utilizes B hospital 132 patient's personal information encrypted image 101a and the information for hospital encrypted image 102a of embedded images changing image 100a respectively generates information embedded images 100b.Here, embedding there are patient's personal information encrypted image 101a of the 1st encryption key related information 141 and embedding have the information for hospital encrypted image 102a of the 2nd encryption key related information 142 to be called patient's personal information embedded images 101b and information for hospital embedded images 102b.
Embed unit 46 by information and carry out the generation of this information embedded images 100b.
(f) at information embedded images 100b, enforcement generates pixel value changing image 100c to the pixel value conversion process that patient's personal information embedded images 101b and information for hospital embedded images 102b carry out chequerization.Here, patient's personal information embedded images 101b and the information for hospital embedded images 102b with the chequerization among the pixel value changing image 100c is called patient's personal information pixel value changing image 101c and information for hospital pixel value changing image 102c.Carry out the generation of this pixel value changing image 100c by pixel value converter unit 47.
(g) by printer etc. pixel value changing image 100c is printed on the print media such as paper, wait by mailing this print media is sent to patient and B hospital, perhaps, pixel value changing image 100c is sent to patient and B hospital by Email.
As mentioned above, A hospital can generate comprise encryption zone that patient only can decipher and only the encryption zone that can decipher of B hospital and send it to patient and B hospital at interior case image (being called the case encrypted image later on).
<patient's case decryption processing 〉
Then, receive patient's the processing of the A hospital of pixel value changing image 100c from A hospital with reference to Fig. 6 explanation.Fig. 6 illustrates the figure that deciphers the treatment step of patient's personal information image 101 according to the pixel value changing image 100c that receives from A hospital.
The patient of A hospital (being designated hereinafter simply as the patient) utilizes image decrypting device of the present invention to carry out the processing of following (a)~(g).
(a) receiving the information conversion that the patient of the print media of having printed " case encrypted image " will print at this print media from A hospital is image.By this conversion, obtain the pixel value changing image 100c that generates by A hospital.The conversion of being undertaken from this type information to image by input unit 51.On the other hand, the patient is receiving under the situation of " case encrypted image " from A hospital by Email, opens " case encrypted image " additional in this Email, thereby obtains pixel value changing image 100c.Being undertaken this by input unit 51 obtains.
(b) remove the pixel value conversion (chequerization) that the patient's personal information pixel value changing image 101c in the pixel value changing image 100c is implemented.Thus, restore patient's personal information embedded images 101b according to patient's personal information pixel value changing image 101c.Carry out the releasing of the pixel value conversion of this patient's personal information pixel value changing image 101c by pixel value converter unit 53.Like this, obtain comprising patient's personal information embedded images 101b and information for hospital pixel value changing image 102c at interior image 110a.
(c) from patient's personal information embedded images 101b of above-mentioned image 110a, extract the relevant information (the 1st encryption key related information 141) of the encryption key encrypted with the public-key cryptography 133 that utilizes the patient 131.Carry out this extraction by information extraction unit 54.By this extraction, patient's personal information embedded images 101b is transformed to patient's personal information encrypted image 101a.
(d) use patient's privacy key 134 takes out encryption key 131 from the 1st encryption key related information 141.Carry out this taking-up by cipher key decryption unit 56.
(e) use encryption key 131,101a deciphers the image of the personal information 101 on the case according to patient's personal information encrypted image.Carry out this deciphering by image transforming unit 57.
(g) patient sees the image 110c that obtains by (e), thus the patient's that reading A hospital allows personal information.
As mentioned above, the patient can be according to the pixel value changing image 100c that sends from A hospital, uses oneself privacy key 134 to know the personal information 101 of self.Under this situation, the patient does not have the privacy key 136 of B hospital, so, can't decipher the secret information that does not allow the patient to read according to pixel value changing image 100c, can't see its content.
<patient sends processing to the case of hospital 〉
Then, be described as follows processing with reference to Fig. 7: the patient is through with after the reading of the case (pixel value changing image 100c) that a part of information is encrypted that receives from A hospital as mentioned above, and the doctor's that has second suggestion B hospital is sent this case.Under this situation, needs of patients after once more personal information 101 being encrypted, sends it to B hospital at the image 110c that personal information 101 is not encrypted shown in Fig. 6 (f) (be called later on patient read image 110c).
The patient utilizes image encrypting apparatus of the present invention to carry out the processing of following (a)~(g).
(a) patient is by input unit 41, for example shows the patient image 110c that reads on the display of personal computer.
(b) patient obtains unit 44 by public-key cryptography, obtains the public-key cryptography 135 of B hospital from public-key cryptography management server 190.
(c) patient is by encrypting regional designating unit 42, specifies in read personal information 101 on the image 110c of the patient who shows on the display picture.Then, by image transforming unit 43, utilize 131 pairs of these personal information 101 of encryption key to encrypt.Thus, the patient read image 110c be transformed to the information for hospital (information for hospital image 102) that comprises the A hospital after the encryption and encrypt after patient's personal information (patient's personal information image 101) at interior image 110b.
(d) patient utilizes 135 pairs of encryption keys 131 of public-key cryptography of B hospital to encrypt by secret key encryption unit 45, generates i.e. the 3rd encryption key related information 143 of the information relevant with the encryption key that generates by this encryption.
(e) patient embeds unit 46 by information, embeds the 3rd encryption key related information 143 among the personal information image 101a of the patient on described image 110b, generates information embedded images 110a.
(f) patient implements the pixel value conversion process by pixel value converter unit 47 at information embedded images 110a, generates pixel value changing image 100c '.
(g) patient's printout pixel value changing image 100c ' sends the print media that printing has pixel value changing image 100c ' to B hospital.Perhaps, send pixel value changing image 100c ' by Email to B hospital.
As mentioned above, the case image 110C after the patient will be decrypted personal information 101 sends to B hospital as the pixel value changing image 100c ' that receives from A hospital.
The case decryption processing of<B hospital 〉
The processing of the B hospital that the case (pixel value changing image 100c ') of the appended document of patient by print media or Email being sent with reference to Fig. 8 explanation receives/deciphers.
B hospital utilizes image decrypting device of the present invention to carry out the processing of following (a)~(e).
(a) doctor of second suggestion of B hospital is by input unit 51, and patient's (brief note is the patient later on) print media that receives or the appended document of Email according to from A hospital make case (pixel value changing image 100c ') image conversion.
(b) doctor is by encrypting regional designating unit 42, patient's personal information pixel value changing image 101c ' on the specified pixel value transform image 100c ' and information for hospital pixel value changing image 102c.Then,, these images 101c ', 102c are carried out the pixel value conversion process, remove the chequer of these images 101c ', 102c by pixel value converter unit 53.Thus, patient's personal information pixel value changing image 101c ' and information for hospital pixel value changing image 102c are transformed to patient's personal information embedded images 101b ' and information for hospital embedded images 102b respectively.
(c) doctor is by information extraction unit 54, takes out encryption key related information 143 (information relevant with the encryption key 131 of public-key cryptography 135 encryptions that utilize B hospital) from patient's personal information embedded images 101b '.Then, use the privacy key 136 of B hospital to take out encryption key related information 142.Then, utilize 136 pairs of encryption key related informations of privacy key 143 and 142 of B hospital to be decrypted, take out encryption key 131 and 132.Then, utilize encryption key 131, use 56 pairs of image transform images of image transforming unit 101a to be decrypted, utilize encryption key 132, use 56 pairs of image transform images of image transforming unit 102a to be decrypted, by each deciphering, patient's personal information image 101 and information for hospital image 102 are decrypted.
(e) doctor reading comprises patient's personal information image 101 and information for hospital image 102 in interior case integral body.
As mentioned above, in the 2nd execution mode, A hospital can use a plurality of encryption keys and a plurality of public-key cryptography (public-key cryptography of patient's public-key cryptography and B hospital), generates " patient's of A hospital personal information " and " not wishing the information for hospital of the A hospital that the patient knows " carried out case behind the image encryption.The patient of A hospital receives the appended document of this case as print media or Email from A hospital, and the privacy key that can use the patient is decrypted/reads the patient's of the encryption on this case personal information.And, after the patient finishes the reading of case, use the public-key cryptography of B hospital that patient's personal information is encrypted, same with the case that A hospital generates, the case that will carry out the information for hospital of patient's personal information and A hospital behind the image encryption sends to B hospital as the appended document of print media or Email.The doctor of second suggestion of B hospital uses the privacy key of B hospital the patient's of the encryption on this case the personal information and the information for hospital of A hospital to be decrypted these information of can reading after receiving the case that the patient of A hospital sends.
Like this; in the 2nd execution mode; use a plurality of encryption keys and a plurality of public-key cryptography, the patient of A hospital, A hospital, this patient's second suggestion are the fail safe that this three parts of doctor of B hospital can guarantee the information for hospital of patient's personal information and A hospital, exchange case.
{ the 3rd execution mode of application system }
The 3rd execution mode of application system of the present invention obtains behind resident's card of communes such as city general office distribution it being submitted to school or sells dealer's etc. the model and use the present invention citizen.The 3rd execution mode is characterised in that, when the resident of A city general office after generating image encryption blocks, when generating the encryption key related information, except the public-key cryptography (Mr. C/Ms's public-key cryptography) that sends the destination, also use the privacy key (privacy key of A city general office) of transmit leg.In the above-mentioned the 1st and the 2nd execution mode, only use the public-key cryptography that sends the destination to generate the encryption key related information.
With reference to Fig. 9 the 3rd execution mode is described.
Fig. 9 is illustrated in Mr. B/Ms to have downloaded resident's card and it is submitted to the system configuration used Mr. C/Ms's the example when of the present invention and the figure of method thereof from A city general office via network.Mr. C/Ms for example is the sale dealer of automobile.In addition, in Fig. 9, the image about the resident's card after encrypting does not illustrate integral body, and the part of encryption only is shown.
A city general office utilizes image encrypting apparatus of the present invention to carry out the processing of following (a)~(f).
(a) Mr. B/Ms is after the distribution of the request resident of A city general office card, and A city general office is taken into the image 200 (be called the resident later on and block original image 200) of resident's card by input unit 41.Then, by encrypting regional designating unit 42, material particular (item relevant with the individual privacy etc.) part of specifying the resident to block original image 200 uses 231 pairs of these parts of encryption key to encrypt.Use image transforming unit 43 to carry out this encryption.By this encryption, the resident blocks original image 200 and is transformed to image transform image 200a.
(b) A city general office obtains unit 44 by public-key cryptography, obtains Mr. B/Ms's public-key cryptography 236 and Mr. C/Ms's public-key cryptography 234 from public-key cryptography management server 290.
(c) A city general office uses Mr. C/Ms's public- key cryptography 234 and 232 pairs of encryption keys 231 of privacy key of A city general office to encrypt by secret key encryption unit 45.For easy, the encryption key 231 that the public-key cryptography 234 that will be by this Mr. C/Ms and the privacy key 232 of A city general office are encrypted is called encryption key related information 243.
(d) A city general office embeds unit 46 by information, in encryption key related information 243 embedded images changing image 200a, generates the information embedded images 200b that encryption key related information 243 is embedded as image.
(e) A city general office implements the pixel value conversion process by pixel value converter unit 47 to information embedded images 200b, makes information embedded images 200b chequerization.By this chequerization, generate pixel value changing image 200c.
(f) A city general office uses Mr. B/Ms's public- key cryptography 236, and 200c carries out Electronic Coding to the pixel value changing image.Carry out this encryption by known digital encryption method.Here, for easy, the pixel value changing image 200c that the public-key cryptography 236 that utilizes Mr. B/Ms is encrypted is called " encrypt the resident and block electronic data ".
Mr. B/Ms carries out following (g), the processing of (h), prints the resident's card behind the image encryption that receives from A city general office, submits to it to print thing to Mr. C/Ms.
(g) Mr. B/Ms uses the open server (not shown) of personal computer visit A city general office, downloads the resident's card (described encryption resident blocks electronic data) of Mr. B/Ms behind the Electronic Coding from the disclosure server.Then, 237 couples of this encryption residents of privacy key of use Mr. B/Ms block electronic data and are decrypted, and print the pixel value changing image 200c that obtains by this deciphering on paper by printer 260.Encrypt the deciphering that the resident blocks electronic data by known digital decrypted method.
Only can print the material particular part by the resident of chequerization card (pixel value changing image 200c), thereby the printing person who guarantees this resident's card is Mr. B/Ms.
(h) the resident card (printing thing) of Mr. B/Ms after Mr. C/Ms's submission is encrypted material particular.
Mr. C/Ms utilizes image decrypting device of the present invention to carry out the processing of following (i)~(1).
(i) Mr. C/Ms is taken into the printing thing that receives from Mr. B/Ms as view data by input unit 41 (in this example for scanner 270).Thus, Mr. C/Ms can access pixel value changing image 200c.
(j) Mr. C/Ms uses pixel value converter unit 53, removes the chequer of pixel value changing image 200c, restores information embedded images 200b according to pixel value changing image 200c.
(k) Mr. C/Ms extracts encryption key related information 243, according to information embedded images 200b restored image changing image 200a by information extraction unit 54 from information embedded images 200b.Then,, use Mr. C/Ms's the privacy key 235 and the public-key cryptography 233 of A city general office, from encryption key related information 243, take out encryption key 231 by cipher key decryption unit 56.In addition, Mr. C/Ms obtains the public-key cryptography 233 of A city general office from public-key cryptography management server 290.
(1) Mr. C/Ms uses encryption key 231 to remove the image encryption of image transform image 200a by image transforming unit 57, restores the resident and blocks original image 200.Thus, Mr. C/Ms resident that can read blocks original image 200, reads resident's card of Mr. B/Ms.
In the 3rd execution mode, can use Mr. C/Ms's the privacy key 235 and the public-key cryptography 233 of A city general office, be decrypted according to 243 pairs of encryption keys 231 of encryption key related information, thus, proved that printing thing (resident's card) that Mr. C/Ms receives from Mr. B/Ms is from A city general office nominally issued.And, in order from encryption key related information 243, to take out encryption key 231, not only need the public-key cryptography 233 of A city general office, also need Mr. C/Ms's privacy key 235, so, the resident's card of can't reading beyond Mr. C/Ms.
In the 3rd execution mode, at present, Mr. B/Ms (citizen or Qu Min etc.) need not go to city general office or district general office, utilize oneself terminals such as personal computer, just can download resident's card that can only receive at the window of city general office or district general office etc., it is printed, submit to Mr. C/Ms (needing Mr. B/Ms to submit people that the resident blocks or legal person etc. to) as printing thing.
This is because satisfy the condition of following (1)~(4).
(1) A city general office uses Mr. C/Ms's public-key cryptography, thus, the submission destination of resident's card only can be defined as Mr. C/Ms
(2) A city general office uses Mr. B/Ms's public-key cryptography, and the download person that thus, the resident can be blocked (resident that material particular has been carried out encrypting blocks) is defined as Mr. B/Ms.
(3) resident's card of downloading from A city general office is encrypted material particular, so Mr. B/Ms can guard the leakage of the personal information of record on resident's card.
(4) can utilize the public-key cryptography of A city general office that the resident of Mr. B/Ms behind the image encryption that Mr. C/Ms submits to sticked into the row deciphering, so, can guarantee that Mr. C/Ms does not have mistake from resident's card that Mr. B/Ms receives, be resident's card of A city general office distribution.
(execution mode of image encrypting apparatus of the present invention }
By executive program (software) on computers such as personal computer, can realize image encrypting apparatus of the present invention by computer.
<hardware configuration 〉
Figure 10 is the figure that illustrates as the hardware configuration of the personal computer of encryption device performance function of the present invention.
The encryption device of present embodiment is that personal computer (PC) 1000 has: outside output interface portion of CPU the 1001, the 1st outer input interface portion 1004 (outer input interface 1), the 2nd outer input interface portion 1005 (outer input interface 2), network interface portion the 1006, the 1st 1007 (outside output interfaces 1), the 2nd outside output interface portion 1008 (outside output interfaces 2), storage arrangement 1010 and data storage device 1020.CPU (Central Processing Unit) 1001 is connected with other structural elements of personal computer 1000 via bus 1030.
The 1st outer input interface portion 1004 is the interfaces that have the 1st external input device 1100 (external input device 1) of image read functions with scanner etc., and the digital picture of the file that the 1st external input device 1100 reads etc. is from 1100 inputs of the 1st external input device.The 2nd outer input interface portion 1005 is interfaces of keyboard or mouse etc., imports these input data or operation signal etc. from the 2nd external input device 1200 (external input device 2) of keyboard or mouse etc.
Network interface portion 1006 for example is LAN (Local Area Network) interface etc., communicates with public-key cryptography management server or internet via LAN or router etc. to be connected, from public-key cryptography management server 90 receiving target public-key cryptography.
The 1st outside output interface portion 1007 is interfaces that printer etc. has the 1st outside output device 1300 (outside output device 1) of printing function, to the 1st outside output device 1 300 output print control command or print datas.The 2nd outside output interface portion 1008 is interfaces that display etc. has the 2nd outside output device 1400 (outside output device 2) of image display function, shows control command or view data to the 2nd outside output device 1400 output images.
Storage arrangement 1010 is main storages of CPU 1001, has program storage area 1011 and data storage area 1012.Program is zones that storage makes personal computer 1000 bring into play functional programs 1060 as image encrypting apparatus with storage area 1011.This program 1060 for example is installed in program with in the storage area 1011 with CPU 1001 executable forms.
Carry out this program 1060 by CPU 1001, make thus personal computer 1000 as shown in Figure 2 have input unit 41, encrypt regional designating unit 42, image transforming unit 43, public-key cryptography obtain unit 44, secret key encryption unit 45, information embed unit 46, pixel value converter unit 47 and output unit 48 image encrypting apparatus 40 and performance function.
The public-key cryptography 1500 of the transmission destination of data usefulness storage area 1012 preservation encryption keys or image encryption data etc.In storage arrangement 1010, also store the middleware of basic software (OS:Operating System) or ICP/IP protocol stack etc. etc.Data with storage area 1012 storage from the data of the 1st and the 2nd external input device 1100,1200 inputs, when the data of the 1st and the 2nd outside output device 1300,1400 outputs and CPU 1001 carry out above-mentioned software needed work data.
Data storage device 1020 for example is internally-arranged type HDD (Hard Disk Drive) or the storage device that is equipped with movable-type recording mediums such as CD, DVD, preserves the data 1600 of conduct encryption (image encryption) object etc.In addition, data storage device 1020 also can be the USB storage that is connected with USB (Universal Serial Bus) terminal, be assemblied in small-sized movable-type recording mediums such as SD (Secure Digital) storage card in the draw-in groove or memory disc.
CPU 1001 control personal computer integral body, and control other structural elements.
The treatment step of<image encrypting apparatus 〉
Figure 11 is the flow chart that CPU 1001 that personal computer shown in Figure 10 1000 is shown carries out the image encryption processing that the programs that are stored in carry out with the program in the storage area 1,011 1060.With reference to Figure 11 the step that above-mentioned image encryption is handled is described.
In data storage device 1020, prepare (S1101) as the data 1600 (being called cryptographic object data 1600 later on) of cryptographic object.
Pass on cryptographic object data 1600 (S1102) to data with storage area 1012 from data storage device 1020.Executive program is transformed to image (view data of bitmap form etc.) (S1103) with the input unit 41 on the storage area 1011 with these cryptographic object data 1600.The image of these cryptographic object data 1600 (view data) is stored in data with in the storage area 1012.
The image (S1104) that on the 2nd outside output device 1400, shows cryptographic object data 1600.The encryption zone designating unit 42 of executive program on the storage area 1011, use the 2nd external input device 1200 (for example mouse etc.), specify in the encryption zone (S1105) of the image of the cryptographic object data 1600 that the picture epigraph of the 2nd outside output device 1400 shows.
Figure 13 illustrates the example of designation method in encryption zone of the image of cryptographic object data 1600.In this example, cryptographic object data 1600 are " encrypted image " such term, specify the zone (the rectangle frame area surrounded of with dashed lines) of the image of the such term of the encirclement " encryption " of this image 1700, as encrypting zone 1701.
The image transforming unit 43 of executive program on the storage area 1011, use encryption key (not shown), data are transformed to image transform image (S1106) with the image (view data) in the encryption zone 1701 of the image 1700 of the cryptographic object data 1600 on the storage area 1012.Handle by this image transform, the image of encrypting zone 1701 is transformed to state (image transform image 1711) that can not interpretation shown in Figure 14 from decipherable state (original image) shown in Figure 13.Thus, as shown in figure 14, the integral image of cryptographic object data 1600 is transformed to the image 1710 that comprises this pixel value changing image 1711.
Executive program is obtained unit 44 with the public-key cryptography on the storage area 1011, via network interface portion 1006 visit public-key cryptography management servers (S1107).Then, obtain the public-key cryptography 1500 that data send the destination from the public-key cryptography management server, with its storage/be kept at data with (S1108) in the storage area 1012.
Executive program uses above-mentioned public-key cryptography 1500 with the secret key encryption unit 45 on the storage area 1011, and described encryption key is encrypted (S1109).In this encryption, for example, use public-key cryptography 1500, be the two-value Bit String of " 10110101 " with the encryption keys of the two-value Bit String (binary data) of " 1111111 ".Here, with above-mentioned same, the encryption key after this encryption is called " encryption key related information ".
Executive program embeds unit 46 with the information on the storage area 1011, goes up embedding above-mentioned encryption key related information (S1110) in data with the image in the encryption zone 1701 on the storage area 1012 (the image transform image 1711 that the processing by step S1106 obtains).Its result, the image of encrypting zone 1701 is transformed to state shown in Figure 15 (information embedded images 1721) from state shown in Figure 14 (image transform image 1711).Thus, as shown in figure 15, the integral image of cryptographic object data 1600 is transformed to the image 1720 that comprises this information embedded images 1721.
Executive program carries out conversion (S1111) to data with the described information embedded images 1721 on the storage area 1012 with the pixel value converter unit 47 on the storage area 1011.Its result, the image of encrypting zone 1701 is transformed to state shown in Figure 16 (the pixel value changing image 1731 of chequer) from state shown in Figure 15 (information embedded images 1721).Thus, as shown in figure 16, the integral image of cryptographic object data 1600 is transformed to the encrypted image 1730 that comprises this pixel value changing image 1731.
On the 2nd outside output device 1400, show this encrypted image 1730 (S1112) that processing generated by step S1111.Then, (S1113) in the data storage device 1020 passed on/be saved in to data with the described encrypted image 1730 on the storage area 1012.
The output unit 48 of executive program on the storage area 1011, use the 1st outside output device 1300, print on paper medium etc. with the described encrypted image 1730 in storage area 1012 or the data storage device 1020 being stored in data, perhaps, send to by Email etc. via network interface portion 1006 and send destination (S1114).
{ execution mode of encrypting and decrypting device of the present invention }
Same with described image encrypting apparatus, by executive program (software) on computers such as personal computer, can realize image decrypting device of the present invention by computer.
<hardware configuration 〉
Figure 17 is the figure that illustrates as the hardware configuration of the personal computer of image decrypting device performance function of the present invention.In Figure 17, to the structural element mark identical label identical with Figure 10.
The image decrypting device of present embodiment is that personal computer (PC) 2000 has the hardware configuration roughly the same with personal computer shown in Figure 10 1000.Therefore, the identical structural element of structural element about being had with above-mentioned personal computer 1000 omits its explanation.
Be that as the personal computer 2000 of image decrypting device performance function with as personal computer 1000 difference structurally of image encrypting apparatus performance function the program storage arrangement 1010 in is with the content by the program of CPU 1001 execution of storage in the storage area 1011.
The personal computer 2000 of present embodiment is the image decrypting device that the image encryption data that generated by the personal computer 1000 as image decrypting device performance function shown in Figure 10 are decrypted.
In personal computer 1000, the image encryption that stores structure shown in Figure 2 in storage area 1011 in program is handled the program 1060 of usefulness.Relative therewith, store the program 2060 that the image decryption processing of structure shown in Figure 3 is used in storage area 2011 in the program of personal computer 2000.Carry out this program 2060 by CPU 1001, make personal computer 2000 obtain the image decrypting device of unit 55, cipher key decryption unit 56, image transforming unit 57 and output unit 58 and bring into play function thus as having input unit 51, encrypted location detecting unit 52, pixel value converter unit 53, information extraction unit 54, public-key cryptography.But, the function that public-key cryptography is obtained unit 55 not necessarily, only generate under the situation of described encryption key related information, need public-key cryptography to obtain the function of unit 55 at the public-key cryptography that uses encrypted image generation side and the privacy key of encrypted image decryption side.Under this situation, public-key cryptography is obtained unit 55 and is obtained the public-key cryptography paired with this privacy key.
And the data of storage arrangement 1010 are preserved enciphered data (encrypted image) 2600 via the 1st external input device 1100 or 1006 inputs of network interface portion (encrypted image that the image encrypting apparatus (personal computer 1000) by Figure 10 generates) with storage area 1012.And data storage device 1020 is preserved when generating described image encryption data 2600 encryption key is encrypted the paired privacy key 2500 of employed public-key cryptography 1500.
The step of<image decryption processing 〉
Figure 18 is the flow chart that illustrates as the treatment step of the personal computer 2000 of the image decrypting device performance function of Figure 17.CPU 1001 executive programs of personal computer 2000 carry out the processing shown in this flow chart thus with the program 2060 on the storage area 1011.In the explanation of flow chart afterwards, adopt the example that enciphered data shown in Figure 16 1700 is decrypted.
At first, in data storage device 1020, prepare recipient (recipient's of the enciphered data that generates by the personal computer 1000 (image encrypting apparatus) of Figure 10) privacy key (S2101).
By this processing, in data storage device 1020, preserve privacy key 2500.
Obtain the enciphered data that the personal computer 1000 (image encrypting apparatus) by Figure 10 generates from the 1st external input device 1100 or network interface portion 1006, it is kept at data with (S2102) in the storage area 1012.
Handle by this, obtain encrypted image shown in Figure 16 1730, it is kept at data with in the storage area 1012 with the form (being called enciphered data here) of printing thing or electronic data.
Executive program is with the input unit 51 on the storage area 1011, and the image (view data) that data are transformed to bitmap form etc. with the described enciphered data on the storage area 1012 (S2103).To be called encrypted image by the image that this conversion obtains.This encrypted image is the final encrypted image that generates of the image encrypting apparatus by Figure 10 (image that equates with encrypted image 1730 shown in Figure 16).
Executive program detects the positional information in the encryption zone of described encrypted image with the encrypted location detecting unit 52 on the storage area 1011, and it is kept at data with (S2104) in the storage area 1012.
The pixel value converter unit 53 of executive program on the storage area 1011, comparable data is with the positional information in the above-mentioned encryption zone on the storage area 1012, and data are transformed to information embedded images (S2105) with the image (pixel value changing image) in the encryption zone of the described encrypted image on the storage area 1012.
Handle by this, the image in the encryption zone 1701 of encrypted image 1730 shown in Figure 16 is transformed to state shown in Figure 15 (information embedded images 1721) from state shown in Figure 16 (pixel value changing image 1731).
The information extraction unit 54 of executive program on the storage area 1011, comparable data is with the described positional information of encrypting the zone on the storage area 1012, extracts encryption key related information (encryption key of encryption) from described information embedded images it is stored in data with (S2106) in the storage area 1012.
Handle by this, from the image (information embedded images 1721) in encryption zone shown in Figure 15, take out " 1011010 " as the encryption key related information.And by the extraction of this encryption key related information, the image of encrypting zone 1701 is transformed to state shown in Figure 14 (image transform image 1711) from state shown in Figure 15 (information embedded images 1721).
If the deciphering of described encryption key related information (encryption key of encryption) needs other public-key cryptography, then executive program is obtained unit 55 with the public-key cryptography on the storage area 1011, obtains the public-key cryptography (S2107) paired with described privacy key 2500 via network interface 1006 from public-key cryptography management server 190.
The cipher key decryption unit 56 of executive program on the storage area 1011, the recipient's that use is prepared in data storage device 1020 privacy key 2500 is encryption key with being kept at data with the deciphering of the encryption key related information (encryption key of encryption) in the storage area 1012.Then, this encryption key being kept at data uses in the storage area 1012 (S2108).In the decryption processing of the encryption key of this step S2108, if described encryption key related information is to utilize privacy key 2500 and the encryption key of the public key encryption obtained from described public-key cryptography management server 90, then in this deciphering, use privacy key 2500 and the disclosure key.
By this processing,, encryption key (=" 1111111 ") is decrypted according to encryption key related information (=" 1011010 ").
Executive program is with the image transforming unit 57 on the storage area 1011, uses data with the encryption key on the storage area 1012, is original image (S2109) with data with the image transform in the encryption zone on the storage area 1012.
Handle by this, the image of encrypting zone 1701 is transformed to state shown in Figure 13 (original image) from state shown in Figure 14 (image transform image 1711).Thus, the encrypted image 1731 in the encryption zone 1701 of the encrypted image 1730 of input unit 51 inputs by this device final decrypted be " encryption " such character image, the original image 1700 that performance is comprised the such term of " encrypted image " of this character image restores.
Data are kept at (S2110) in the data storage device 1020 with the described original image on the storage area 1012 (data of original image).
Via the 2nd original image (S2111) of outside output interface portion 1008 on the 2nd outside output device 1400 (for example display) output (demonstration) data storage device 1020.
The invention is not restricted to above-mentioned execution mode, in the scope that does not break away from purport of the present invention, can carry out various distortion and implement.For example, except personal computer, also can in photocopier (also comprising compounding machine), FAX, printer, scanner, top set reader, portable phone, portable terminal device, digital camera, TV etc., assemble function of the present invention.
Utilizability on the industry
In the present invention, numerous users such as administration, enterprise, general user can utilize paper The various media such as medium, storage medium and electronic data, safety and the individual letter of at low cost exchange Breath etc. requires invisible important information. Therefore, administrative organs, enterprise and general user it Between exchange when requiring invisible important information, very convenient.

Claims (32)

1. image encrypting apparatus, this image encrypting apparatus is encrypted image, it is characterized in that, and this image encrypting apparatus has:
Input unit, its input is as the view data of cryptographic object;
Encrypt regional designating unit, it specifies the zone as cryptographic object at the view data by this input unit input;
Image transforming unit, it uses encryption key to be transformed to the 1st image by this encryption zone of encrypting regional designating unit appointment;
Public-key cryptography is obtained the unit, and it obtains the public-key cryptography of transmission destination of the data of described cryptographic object;
The secret key encryption unit, its use obtains the public-key cryptography of obtaining the unit by the disclosure key described encryption key is encrypted;
Information embeds the unit, and it embeds the encryption key related information in described the 1st image, and described encryption zone is transformed to the 2nd image, and wherein, this encryption key related information is and the relevant information of encryption key of being encrypted by this secret key encryption unit;
The pixel value converter unit, the pixel value of described the 2nd image of its conversion so that can determine zone by the regional designating unit appointment of described encryption, is transformed to the 3rd image with described encryption zone; And
Output unit, it exports encrypted image with prescribed manner, and this encrypted image is that described the 3rd image obtains with described image transform of encrypting the zone in by the image of described input unit input.
2. image encrypting apparatus according to claim 1 is characterized in that,
The regional designating unit of described encryption is specified a plurality of encryptions zone,
Described image transforming unit is used a plurality of encryption keys described a plurality of each regional image of encrypting the zone of conversion respectively,
Described public-key cryptography is obtained the unit and is obtained a plurality of public-key cryptography,
Described secret key encryption unit uses and obtains a plurality of public-key cryptography that the unit is obtained by described public-key cryptography, respectively employed each encryption key of image in each encryption zone of described image transforming unit conversion is encrypted.
3. image encrypting apparatus according to claim 2 is characterized in that,
It is public-key cryptography of a plurality of transmissions destination that described public-key cryptography is obtained a plurality of public-key cryptography of obtaining the unit.
4. image encrypting apparatus according to claim 1 and 2 is characterized in that,
Described secret key encryption unit uses described public-key cryptography and described transmission destination will submit the other side's of described encrypted image privacy key to, and described encryption key is encrypted.
5. according to each the described image encrypting apparatus in the claim 1~4, it is characterized in that,
Described public-key cryptography is obtained the unit and is obtained described public-key cryptography from the public-key cryptography management server that described public-key cryptography is managed.
6. the encrypted image deciphering that image decrypting device, this image decrypting device will comprise the image after the encryption is original image, it is characterized in that this image decrypting device has:
Input unit, it imports described encrypted image as view data;
The encrypted location detecting unit, its described encrypted image to this input unit input is resolved, and detects the position in the encryption zone in the described encrypted image, and wherein, this encryption zone is the zone of in described encrypted image image being encrypted;
The pixel value converter unit, it makes the pixel value before the described pixel value of encrypting the image in zone reverts to conversion, determines described position of encrypting the zone with basis by the detected described positional information of encrypting the zone of this encrypted location detecting unit;
Information extraction unit, it extracts the encryption key related information from the described image of encrypting the zone that is generated by this pixel value converter unit, and wherein, this encryption key related information is and embeds the relevant information of encryption key in the described image of encrypting the zone;
Cipher key decryption unit, it uses the 1st privacy key, according to described encryption key related information, be decrypted deciphering the described employed decruption key of image of encrypting the zone, wherein, the 1st privacy key is paired with employed the 1st public-key cryptography of generation of the described encryption key related information that is extracted by this information extraction unit;
Image transforming unit, it uses the decruption key by this cipher key decryption unit deciphering that the described image of encrypting the zone is decrypted, and described original image is decrypted; And
Output unit, it exports described original image with prescribed manner.
7. image decrypting device according to claim 6 is characterized in that,
The privacy key that the transmission destination that described the 1st privacy key is described encrypted image is possessed, described the 1st privacy key are will submit to the other side of described encrypted image to decipher the paired privacy key of employed the 2nd public-key cryptography of described encrypted image with described transmission destination.
8. according to claim 6 or 7 described image decrypting devices, it is characterized in that,
Described image decrypting device also has public-key cryptography and obtains the unit, by described the 1st public-key cryptography and the 2nd privacy key described encryption key related information is being carried out under the situation of encrypting, the disclosure key is obtained the unit and is obtained 2nd public-key cryptography paired with described the 2nd privacy key
Described secret key encryption unit uses described the 1st privacy key and described the 2nd public-key cryptography that described decruption key is decrypted according to described encryption key related information.
9. according to claim 6 or 7 described image decrypting devices, it is characterized in that,
Described encryption zone is a plurality of.
10. image decrypting device according to claim 9 is characterized in that,
Each each encryption key related information that image comprised of encrypting the zone is independently relevant with encryption key information,
Described information extraction unit is extracted independently encryption key related information from described respectively the encryption the zone,
Described cipher key decryption unit is according to each the encryption key related information that is extracted by described information extraction unit, the paired public-key cryptography of the employed privacy key of generation of use and each encryption key related information embeds regional employed each decruption key of image of each encryption that described each encryption key related information is arranged to deciphering and is decrypted.
11. each the described image decrypting device according in the claim 6~10 is characterized in that,
Described public-key cryptography is obtained the unit and is obtained described public-key cryptography from the public-key cryptography management server that described public-key cryptography is managed.
12. an image encryption method, this image encryption method is encrypted image, it is characterized in that, this image encryption method has carries out the following step of handling:
Input is as the view data of cryptographic object;
At view data, specify zone as cryptographic object by this input step input;
Use encryption key that the encryption zone of this appointment is transformed to the 1st image;
Obtain the public-key cryptography of transmission destination of the data of described cryptographic object;
Use this public-key cryptography of obtaining that described encryption key is encrypted;
The encryption key related information is embedded in described the 1st image, described encryption zone is transformed to the 2nd image, wherein, this encryption key related information is the information relevant with the encryption key of this encryption;
The pixel value of described the 2nd image of conversion is so that can determine as described cryptographic object and the zone of appointment is transformed to the 3rd image with described encryption zone; And
With prescribed manner output encrypted image, this encrypted image is that described the 3rd image obtains with described image transform of encrypting the zone in the image of the cryptographic object of described input.
13. image encryption method according to claim 12 is characterized in that,
In the regional given step of described encryption, specify a plurality of encryptions zone,
In described image transform step, use a plurality of encryption keys described a plurality of each regional image of encrypting the zone of conversion respectively,
Obtain in the step at described public-key cryptography, obtain a plurality of public-key cryptography,
In described secret key encryption step, use and obtain a plurality of public-key cryptography of obtaining in the step at described public-key cryptography, respectively employed each encryption key of image in each encryption zone of conversion in described image transform step is encrypted.
14. according to claim 12 or 13 described image encryption methods, it is characterized in that,
Obtaining a plurality of public-key cryptography of obtaining in the step at described public-key cryptography is public-key cryptography of a plurality of transmissions destination.
15. an image decryption method, this image decryption method will comprise the encrypted image deciphering of the image after the encryption for original image, it is characterized in that, this image decryption method has carries out the following step of handling:
Import described encrypted image as view data;
The encrypted image of importing in this input step is resolved, detect the position in the encryption zone in the described encrypted image, wherein, this encryption zone is the zone of in described encrypted image image being encrypted;
Make the pixel value before the described pixel value of encrypting the image in zone reverts to conversion, to determine described position of encrypting the zone according to this detected described positional information of encrypting the zone;
From the described image of encrypting the zone that this pixel value shift step, generates, extract the encryption key related information, wherein, this encryption key related information is and embeds the relevant information of encryption key in the described image of encrypting the zone;
Use the 1st privacy key, according to described encryption key related information, be decrypted deciphering the described employed decruption key of image of encrypting the zone, wherein, employed the 1st public-key cryptography of the generation of the described encryption key related information that the 1st privacy key and this extract is paired;
Use the decruption key of this deciphering that the described image of encrypting the zone is decrypted, described original image is decrypted; And
Export described original image with prescribed manner.
16. image decryption method according to claim 15 is characterized in that,
The privacy key that the transmission destination that described the 1st privacy key is described encrypted image is possessed, described the 1st privacy key are will submit to the other side of described encrypted image to decipher the paired privacy key of employed the 2nd public-key cryptography of described encrypted image with described transmission destination.
17. according to claim 15 or 16 described image decryption methods, it is characterized in that,
Described image decryption method also has following steps: under the situation of described encryption key related information being encrypted, obtain 2nd public-key cryptography paired with described the 2nd privacy key by described the 1st public-key cryptography and the 2nd privacy key,
In described secret key encryption step,, use described the 1st privacy key and described the 2nd public-key cryptography that described decruption key is decrypted according to described encryption key related information.
18. according to claim 15 or 16 described image decryption methods, it is characterized in that,
Described encryption zone is a plurality of.
19. image decryption method according to claim 18 is characterized in that,
Each each encryption key related information that image comprised of encrypting the zone is independently relevant with encryption key information,
In described information extraction step, extract independently encryption key related information the zone from described respectively the encryption,
In described secret key decryption step, according to each the encryption key related information that in described information extraction step, extracts, the paired public-key cryptography of the employed privacy key of generation of use and each encryption key related information embeds regional employed each decruption key of image of each encryption that described each encryption key related information is arranged to deciphering and is decrypted.
20. an image encryption program is characterized in that, it makes computer as carrying out work as lower unit, and so that image is encrypted, this unit comprises:
Input unit, its input is as the view data of cryptographic object;
Encrypt regional designating unit, it specifies the zone as cryptographic object at the image by this input unit input;
Image transforming unit, it uses encryption key to be transformed to the 1st image by this encryption zone of encrypting regional designating unit appointment;
Public-key cryptography is obtained the unit, and it obtains the public-key cryptography of transmission destination of the data of described cryptographic object;
The secret key encryption unit, its use obtains the public-key cryptography of obtaining the unit by the disclosure key described encryption key is encrypted;
Information embeds the unit, and it embeds the encryption key related information in described the 1st image, and described encryption zone is transformed to the 2nd image, and wherein, this encryption key related information is and the relevant information of encryption key of being encrypted by this secret key encryption unit;
The pixel value converter unit, the pixel value of described the 2nd image of its conversion so that can determine zone by the regional designating unit appointment of described encryption, is transformed to the 3rd image with described encryption zone; And
Output unit, it exports encrypted image with prescribed manner, and this encrypted image is that described the 3rd image obtains with described image transform of encrypting the zone in by the image of described input unit input.
21. image encryption program according to claim 20 is characterized in that,
The regional designating unit of described encryption is specified a plurality of encryptions zone,
Described image transforming unit is used a plurality of encryption keys described a plurality of each regional image of encrypting the zone of conversion respectively,
Described public-key cryptography is obtained the unit and is obtained a plurality of public-key cryptography,
Described secret key encryption unit uses and obtains a plurality of public-key cryptography that the unit is obtained by described public-key cryptography, respectively employed each encryption key of image in each encryption zone of described image transforming unit conversion is encrypted.
22. image encryption program according to claim 21 is characterized in that,
Described image transforming unit is used independently respectively, and encryption key comes the regional image of each encryption of conversion.
23. according to claim 21 or 22 described image encryption programs, it is characterized in that,
It is public-key cryptography of a plurality of transmissions destination that described public-key cryptography is obtained a plurality of public-key cryptography of obtaining the unit.
24. each the described image encryption program according in the claim 20~23 is characterized in that,
Described public-key cryptography is obtained the unit and is obtained described public-key cryptography from the public-key cryptography management server that described public-key cryptography is managed.
25. an image decrypted program is characterized in that, it makes computer as carrying out work as lower unit, and deciphering with the encrypted image that will comprise the image after the encryption is original image, and this unit comprises:
Input unit, it imports described encrypted image as view data;
The encrypted location detecting unit, its described encrypted image to this input unit input is resolved, and detects the position in the encryption zone in the described encrypted image, and wherein, this encryption zone is the zone of in described encrypted image image being encrypted;
The pixel value converter unit, it makes the pixel value before the described pixel value of encrypting the image in zone reverts to conversion, determines described position of encrypting the zone with basis by the detected described positional information of encrypting the zone of this encrypted location detecting unit;
Information extraction unit, it extracts the encryption key related information from the described image of encrypting the zone that is generated by this pixel value converter unit, and wherein, this encryption key related information is and embeds the relevant information of encryption key in the described image of encrypting the zone;
Cipher key decryption unit, it uses the 1st privacy key, according to described encryption key related information, be decrypted deciphering the described employed decruption key of image of encrypting the zone, wherein, the 1st privacy key is paired with employed the 1st public-key cryptography of generation of the described encryption key related information that is extracted by this information extraction unit;
Image transforming unit, it uses the decruption key by this cipher key decryption unit deciphering that the described image of encrypting the zone is decrypted, and described original image is decrypted; And
Export described original image with prescribed manner.
26. image decrypted program according to claim 25 is characterized in that,
The privacy key that the transmission destination that described the 1st privacy key is described encrypted image is possessed, described the 1st privacy key are will submit to the other side of described encrypted image to decipher the paired privacy key of employed the 2nd public-key cryptography of described encrypted image with described transmission destination.
27. according to claim 25 or 26 described image decrypted programs, it is characterized in that,
Described image decrypted program also has public-key cryptography and obtains the unit, under the situation of described encryption key related information being encrypted by described the 1st public-key cryptography and the 2nd privacy key, the disclosure key is obtained the unit and is obtained 2nd public-key cryptography paired with described the 2nd privacy key
Described secret key encryption unit uses described the 1st privacy key and described the 2nd public-key cryptography that described decruption key is decrypted according to described encryption key related information.
28. according to claim 25 or 26 described image decrypted programs, it is characterized in that,
Described encryption zone is a plurality of.
29. image decrypted program according to claim 28 is characterized in that,
Each each encryption key related information that image comprised of encrypting the zone is independently relevant with encryption key information,
Described information extraction unit is extracted independently encryption key related information from described respectively the encryption the zone,
Described cipher key decryption unit is according to each the encryption key related information that is extracted by described information extraction unit, the paired public-key cryptography of the employed privacy key of generation of use and each encryption key related information embeds regional employed each decruption key of image of each encryption that described each encryption key related information is arranged to deciphering and is decrypted.
30. each the described image decrypted program according in the claim 25~29 is characterized in that,
Described public-key cryptography is obtained the unit and is obtained described public-key cryptography from the public-key cryptography management server that described public-key cryptography is managed.
31. image encrypting apparatus according to claim 1, the described image encryption method of claim 12, the described image encryption program of claim 20, the described image decrypting device of claim 6, the described image decryption method of claim 15 and the described image decrypted program of claim 25, it is characterized in that
The view data that described input unit or described input step are imported is image or will prints thing or non-picture data is transformed to data behind the image.
32. according to the described image encrypting apparatus of described claim 1, the described image encryption method of claim 12, the described image encryption program of claim 20, the described image decrypting device of claim 6, the described image decryption method of claim 15 and the described image decrypted program of claim 25, it is characterized in that
The dateout that described output unit or described output step are exported is at least one side of image, printing thing or non-picture data.
CN200780053113A 2007-05-30 2007-05-30 Image encrypting device, image decrypting device, method and program Pending CN101682503A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2007/000581 WO2008146332A1 (en) 2007-05-30 2007-05-30 Image encrypting device, image decrypting device, method and program

Publications (1)

Publication Number Publication Date
CN101682503A true CN101682503A (en) 2010-03-24

Family

ID=40074621

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200780053113A Pending CN101682503A (en) 2007-05-30 2007-05-30 Image encrypting device, image decrypting device, method and program

Country Status (6)

Country Link
US (1) US8571212B2 (en)
EP (1) EP2154815A4 (en)
JP (1) JP5018880B2 (en)
KR (1) KR101059302B1 (en)
CN (1) CN101682503A (en)
WO (1) WO2008146332A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105354501A (en) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 Photo processing method and processing system
CN107092842A (en) * 2017-04-14 2017-08-25 苏州三星电子电脑有限公司 Secrecy display method and private display device
CN107851168A (en) * 2015-08-06 2018-03-27 三菱电机株式会社 Authentication device, Verification System and authentication method

Families Citing this family (148)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11275509B1 (en) 2010-09-15 2022-03-15 Pure Storage, Inc. Intelligently sizing high latency I/O requests in a storage environment
US8589625B2 (en) 2010-09-15 2013-11-19 Pure Storage, Inc. Scheduling of reconstructive I/O read operations in a storage environment
US8589655B2 (en) 2010-09-15 2013-11-19 Pure Storage, Inc. Scheduling of I/O in an SSD environment
US11614893B2 (en) 2010-09-15 2023-03-28 Pure Storage, Inc. Optimizing storage device access based on latency
US8468318B2 (en) 2010-09-15 2013-06-18 Pure Storage Inc. Scheduling of I/O writes in a storage environment
US8732426B2 (en) 2010-09-15 2014-05-20 Pure Storage, Inc. Scheduling of reactive I/O operations in a storage environment
US9244769B2 (en) 2010-09-28 2016-01-26 Pure Storage, Inc. Offset protection data in a RAID array
US8775868B2 (en) 2010-09-28 2014-07-08 Pure Storage, Inc. Adaptive RAID for an SSD environment
JP5703714B2 (en) * 2010-11-22 2015-04-22 日本電気株式会社 Data processing apparatus, data processing system, data processing program, and access restriction method
US8589640B2 (en) 2011-10-14 2013-11-19 Pure Storage, Inc. Method for maintaining multiple fingerprint tables in a deduplicating storage system
US11636031B2 (en) 2011-08-11 2023-04-25 Pure Storage, Inc. Optimized inline deduplication
US8934662B1 (en) * 2012-03-12 2015-01-13 Google Inc. Tracking image origins
US8719540B1 (en) 2012-03-15 2014-05-06 Pure Storage, Inc. Fractal layout of data blocks across multiple devices
US8745415B2 (en) 2012-09-26 2014-06-03 Pure Storage, Inc. Multi-drive cooperation to generate an encryption key
US10623386B1 (en) 2012-09-26 2020-04-14 Pure Storage, Inc. Secret sharing data protection in a storage system
US11032259B1 (en) 2012-09-26 2021-06-08 Pure Storage, Inc. Data protection in a storage system
US9223932B1 (en) 2012-11-24 2015-12-29 Mach 7 Technologies, Inc. Handheld medical imaging mobile modality
US11733908B2 (en) 2013-01-10 2023-08-22 Pure Storage, Inc. Delaying deletion of a dataset
US9436720B2 (en) 2013-01-10 2016-09-06 Pure Storage, Inc. Safety for volume operations
US11768623B2 (en) 2013-01-10 2023-09-26 Pure Storage, Inc. Optimizing generalized transfers between storage systems
US10908835B1 (en) 2013-01-10 2021-02-02 Pure Storage, Inc. Reversing deletion of a virtual machine
KR20140115979A (en) * 2013-03-22 2014-10-01 삼성전자주식회사 Method for storing data and an electronic device thereof
JP5859484B2 (en) * 2013-05-31 2016-02-10 京セラドキュメントソリューションズ株式会社 Image forming apparatus, file browsing control system, and image forming method
CN104426973B (en) * 2013-09-03 2018-03-23 中国移动通信集团公司 A kind of cloud database encryption method, system and device
US10365858B2 (en) 2013-11-06 2019-07-30 Pure Storage, Inc. Thin provisioning in a storage device
US10263770B2 (en) 2013-11-06 2019-04-16 Pure Storage, Inc. Data protection in a storage system using external secrets
US11128448B1 (en) 2013-11-06 2021-09-21 Pure Storage, Inc. Quorum-aware secret sharing
US9516016B2 (en) 2013-11-11 2016-12-06 Pure Storage, Inc. Storage array password management
CN104660631A (en) * 2013-11-19 2015-05-27 中国科学院深圳先进技术研究院 Photo backup method, device and system and mobile terminal
US9208086B1 (en) 2014-01-09 2015-12-08 Pure Storage, Inc. Using frequency domain to prioritize storage of metadata in a cache
US10656864B2 (en) 2014-03-20 2020-05-19 Pure Storage, Inc. Data replication within a flash storage array
US9513820B1 (en) 2014-04-07 2016-12-06 Pure Storage, Inc. Dynamically controlling temporary compromise on data redundancy
US9779268B1 (en) 2014-06-03 2017-10-03 Pure Storage, Inc. Utilizing a non-repeating identifier to encrypt data
US11399063B2 (en) 2014-06-04 2022-07-26 Pure Storage, Inc. Network authentication for a storage system
US9218244B1 (en) 2014-06-04 2015-12-22 Pure Storage, Inc. Rebuilding data across storage nodes
US9218407B1 (en) 2014-06-25 2015-12-22 Pure Storage, Inc. Replication and intermediate read-write state for mediums
US10496556B1 (en) 2014-06-25 2019-12-03 Pure Storage, Inc. Dynamic data protection within a flash storage system
US10296469B1 (en) 2014-07-24 2019-05-21 Pure Storage, Inc. Access control in a flash storage system
US9558069B2 (en) 2014-08-07 2017-01-31 Pure Storage, Inc. Failure mapping in a storage array
US9495255B2 (en) 2014-08-07 2016-11-15 Pure Storage, Inc. Error recovery in a storage cluster
US9864761B1 (en) 2014-08-08 2018-01-09 Pure Storage, Inc. Read optimization operations in a storage system
US10430079B2 (en) 2014-09-08 2019-10-01 Pure Storage, Inc. Adjusting storage capacity in a computing system
US10164841B2 (en) 2014-10-02 2018-12-25 Pure Storage, Inc. Cloud assist for storage systems
US10430282B2 (en) 2014-10-07 2019-10-01 Pure Storage, Inc. Optimizing replication by distinguishing user and system write activity
US9489132B2 (en) 2014-10-07 2016-11-08 Pure Storage, Inc. Utilizing unmapped and unknown states in a replicated storage system
US9727485B1 (en) 2014-11-24 2017-08-08 Pure Storage, Inc. Metadata rewrite and flatten optimization
US9773007B1 (en) 2014-12-01 2017-09-26 Pure Storage, Inc. Performance improvements in a storage system
US9552248B2 (en) 2014-12-11 2017-01-24 Pure Storage, Inc. Cloud alert to replica
US9588842B1 (en) 2014-12-11 2017-03-07 Pure Storage, Inc. Drive rebuild
US9864769B2 (en) 2014-12-12 2018-01-09 Pure Storage, Inc. Storing data utilizing repeating pattern detection
US10545987B2 (en) 2014-12-19 2020-01-28 Pure Storage, Inc. Replication to the cloud
US9569357B1 (en) 2015-01-08 2017-02-14 Pure Storage, Inc. Managing compressed data in a storage system
US10296354B1 (en) 2015-01-21 2019-05-21 Pure Storage, Inc. Optimized boot operations within a flash storage array
US11947968B2 (en) 2015-01-21 2024-04-02 Pure Storage, Inc. Efficient use of zone in a storage device
US9710165B1 (en) 2015-02-18 2017-07-18 Pure Storage, Inc. Identifying volume candidates for space reclamation
US10157339B2 (en) * 2015-03-03 2018-12-18 WonderHealth, LLC Access control for encrypted data in machine-readable identifiers
US10082985B2 (en) 2015-03-27 2018-09-25 Pure Storage, Inc. Data striping across storage nodes that are assigned to multiple logical arrays
US20160292447A1 (en) * 2015-04-06 2016-10-06 Lawlitt Life Solutions, LLC Multi-layered encryption
US10178169B2 (en) 2015-04-09 2019-01-08 Pure Storage, Inc. Point to point based backend communication layer for storage processing
US10140149B1 (en) 2015-05-19 2018-11-27 Pure Storage, Inc. Transactional commits with hardware assists in remote memory
CN104842935A (en) * 2015-05-20 2015-08-19 王方圆 Burglar alarm display
US9547441B1 (en) 2015-06-23 2017-01-17 Pure Storage, Inc. Exposing a geometry of a storage device
US10310740B2 (en) 2015-06-23 2019-06-04 Pure Storage, Inc. Aligning memory access operations to a geometry of a storage device
KR20170028825A (en) 2015-09-04 2017-03-14 퓨어 스토리지, 아이앤씨. Memory-efficient storage and searching in hash tables using compressed indexes
US11341136B2 (en) 2015-09-04 2022-05-24 Pure Storage, Inc. Dynamically resizable structures for approximate membership queries
US11269884B2 (en) 2015-09-04 2022-03-08 Pure Storage, Inc. Dynamically resizable structures for approximate membership queries
US9843453B2 (en) 2015-10-23 2017-12-12 Pure Storage, Inc. Authorizing I/O commands with I/O tokens
CN105678174A (en) * 2015-12-31 2016-06-15 四川秘无痕信息安全技术有限责任公司 Method for decrypting WeChat encrypted data based on binary system
JP6856321B2 (en) * 2016-03-29 2021-04-07 株式会社東芝 Image processing system, image processing device, and image processing program
US10452297B1 (en) 2016-05-02 2019-10-22 Pure Storage, Inc. Generating and optimizing summary index levels in a deduplication storage system
US10133503B1 (en) 2016-05-02 2018-11-20 Pure Storage, Inc. Selecting a deduplication process based on a difference between performance metrics
US10203903B2 (en) 2016-07-26 2019-02-12 Pure Storage, Inc. Geometry based, space aware shelf/writegroup evacuation
US10191662B2 (en) 2016-10-04 2019-01-29 Pure Storage, Inc. Dynamic allocation of segments in a flash storage system
US10162523B2 (en) 2016-10-04 2018-12-25 Pure Storage, Inc. Migrating data between volumes using virtual copy operation
US10613974B2 (en) 2016-10-04 2020-04-07 Pure Storage, Inc. Peer-to-peer non-volatile random-access memory
US10756816B1 (en) 2016-10-04 2020-08-25 Pure Storage, Inc. Optimized fibre channel and non-volatile memory express access
US10481798B2 (en) 2016-10-28 2019-11-19 Pure Storage, Inc. Efficient flash management for multiple controllers
US10185505B1 (en) 2016-10-28 2019-01-22 Pure Storage, Inc. Reading a portion of data to replicate a volume based on sequence numbers
US10359942B2 (en) 2016-10-31 2019-07-23 Pure Storage, Inc. Deduplication aware scalable content placement
US10887291B2 (en) * 2016-12-16 2021-01-05 Amazon Technologies, Inc. Secure data distribution of sensitive data across content delivery networks
US11550481B2 (en) 2016-12-19 2023-01-10 Pure Storage, Inc. Efficiently writing data in a zoned drive storage system
US10452290B2 (en) 2016-12-19 2019-10-22 Pure Storage, Inc. Block consolidation in a direct-mapped flash storage system
US11093146B2 (en) 2017-01-12 2021-08-17 Pure Storage, Inc. Automatic load rebalancing of a write group
US10528488B1 (en) 2017-03-30 2020-01-07 Pure Storage, Inc. Efficient name coding
US11403019B2 (en) 2017-04-21 2022-08-02 Pure Storage, Inc. Deduplication-aware per-tenant encryption
US10944671B2 (en) 2017-04-27 2021-03-09 Pure Storage, Inc. Efficient data forwarding in a networked device
US10699622B2 (en) * 2017-06-04 2020-06-30 Apple Inc. Long-term history of display intensities
WO2019017876A1 (en) * 2017-07-17 2019-01-24 Hewlett-Packard Development Company, L.P. Encrypted printing
US10402266B1 (en) 2017-07-31 2019-09-03 Pure Storage, Inc. Redundant array of independent disks in a direct-mapped flash storage system
US10831935B2 (en) 2017-08-31 2020-11-10 Pure Storage, Inc. Encryption management with host-side data reduction
US10776202B1 (en) 2017-09-22 2020-09-15 Pure Storage, Inc. Drive, blade, or data shard decommission via RAID geometry shrinkage
US10789211B1 (en) 2017-10-04 2020-09-29 Pure Storage, Inc. Feature-based deduplication
US10884919B2 (en) 2017-10-31 2021-01-05 Pure Storage, Inc. Memory management in a storage system
US10860475B1 (en) 2017-11-17 2020-12-08 Pure Storage, Inc. Hybrid flash translation layer
US10970395B1 (en) 2018-01-18 2021-04-06 Pure Storage, Inc Security threat monitoring for a storage system
US11010233B1 (en) 2018-01-18 2021-05-18 Pure Storage, Inc Hardware-based system monitoring
US11144638B1 (en) 2018-01-18 2021-10-12 Pure Storage, Inc. Method for storage system detection and alerting on potential malicious action
US10467527B1 (en) 2018-01-31 2019-11-05 Pure Storage, Inc. Method and apparatus for artificial intelligence acceleration
US11036596B1 (en) 2018-02-18 2021-06-15 Pure Storage, Inc. System for delaying acknowledgements on open NAND locations until durability has been confirmed
US11494109B1 (en) 2018-02-22 2022-11-08 Pure Storage, Inc. Erase block trimming for heterogenous flash memory storage devices
US11159498B1 (en) 2018-03-21 2021-10-26 Amazon Technologies, Inc. Information security proxy service
US11934322B1 (en) 2018-04-05 2024-03-19 Pure Storage, Inc. Multiple encryption keys on storage drives
US10678433B1 (en) 2018-04-27 2020-06-09 Pure Storage, Inc. Resource-preserving system upgrade
US11385792B2 (en) 2018-04-27 2022-07-12 Pure Storage, Inc. High availability controller pair transitioning
US10678436B1 (en) 2018-05-29 2020-06-09 Pure Storage, Inc. Using a PID controller to opportunistically compress more data during garbage collection
US11436023B2 (en) 2018-05-31 2022-09-06 Pure Storage, Inc. Mechanism for updating host file system and flash translation layer based on underlying NAND technology
US10979403B1 (en) 2018-06-08 2021-04-13 Amazon Technologies, Inc. Cryptographic configuration enforcement
US10776046B1 (en) 2018-06-08 2020-09-15 Pure Storage, Inc. Optimized non-uniform memory access
US11281577B1 (en) 2018-06-19 2022-03-22 Pure Storage, Inc. Garbage collection tuning for low drive wear
US11869586B2 (en) 2018-07-11 2024-01-09 Pure Storage, Inc. Increased data protection by recovering data from partially-failed solid-state devices
US11133076B2 (en) 2018-09-06 2021-09-28 Pure Storage, Inc. Efficient relocation of data between storage devices of a storage system
US11194759B2 (en) 2018-09-06 2021-12-07 Pure Storage, Inc. Optimizing local data relocation operations of a storage device of a storage system
US10846216B2 (en) 2018-10-25 2020-11-24 Pure Storage, Inc. Scalable garbage collection
US11113409B2 (en) 2018-10-26 2021-09-07 Pure Storage, Inc. Efficient rekey in a transparent decrypting storage array
US11194473B1 (en) 2019-01-23 2021-12-07 Pure Storage, Inc. Programming frequently read data to low latency portions of a solid-state storage array
US11588633B1 (en) 2019-03-15 2023-02-21 Pure Storage, Inc. Decommissioning keys in a decryption storage system
US11334254B2 (en) 2019-03-29 2022-05-17 Pure Storage, Inc. Reliability based flash page sizing
US11775189B2 (en) 2019-04-03 2023-10-03 Pure Storage, Inc. Segment level heterogeneity
US11397674B1 (en) 2019-04-03 2022-07-26 Pure Storage, Inc. Optimizing garbage collection across heterogeneous flash devices
US10990480B1 (en) 2019-04-05 2021-04-27 Pure Storage, Inc. Performance of RAID rebuild operations by a storage group controller of a storage system
US11099986B2 (en) 2019-04-12 2021-08-24 Pure Storage, Inc. Efficient transfer of memory contents
US11487665B2 (en) 2019-06-05 2022-11-01 Pure Storage, Inc. Tiered caching of data in a storage system
US11281394B2 (en) 2019-06-24 2022-03-22 Pure Storage, Inc. Replication across partitioning schemes in a distributed storage system
US10929046B2 (en) 2019-07-09 2021-02-23 Pure Storage, Inc. Identifying and relocating hot data to a cache determined with read velocity based on a threshold stored at a storage device
US11422751B2 (en) 2019-07-18 2022-08-23 Pure Storage, Inc. Creating a virtual storage system
US11086713B1 (en) 2019-07-23 2021-08-10 Pure Storage, Inc. Optimized end-to-end integrity storage system
US11963321B2 (en) 2019-09-11 2024-04-16 Pure Storage, Inc. Low profile latching mechanism
US11403043B2 (en) 2019-10-15 2022-08-02 Pure Storage, Inc. Efficient data compression by grouping similar data within a data segment
KR102268335B1 (en) * 2019-10-28 2021-06-24 주식회사 아이도트 Colposcopy
EP4050841A4 (en) * 2019-11-21 2022-12-14 Sony Group Corporation File processing device and file processing method
US11520907B1 (en) 2019-11-22 2022-12-06 Pure Storage, Inc. Storage system snapshot retention based on encrypted data
US11941116B2 (en) 2019-11-22 2024-03-26 Pure Storage, Inc. Ransomware-based data protection parameter modification
US11657155B2 (en) 2019-11-22 2023-05-23 Pure Storage, Inc Snapshot delta metric based determination of a possible ransomware attack against data maintained by a storage system
US11625481B2 (en) 2019-11-22 2023-04-11 Pure Storage, Inc. Selective throttling of operations potentially related to a security threat to a storage system
US11720692B2 (en) 2019-11-22 2023-08-08 Pure Storage, Inc. Hardware token based management of recovery datasets for a storage system
US11687418B2 (en) 2019-11-22 2023-06-27 Pure Storage, Inc. Automatic generation of recovery plans specific to individual storage elements
US11755751B2 (en) 2019-11-22 2023-09-12 Pure Storage, Inc. Modify access restrictions in response to a possible attack against data stored by a storage system
US11720714B2 (en) 2019-11-22 2023-08-08 Pure Storage, Inc. Inter-I/O relationship based detection of a security threat to a storage system
US11645162B2 (en) 2019-11-22 2023-05-09 Pure Storage, Inc. Recovery point determination for data restoration in a storage system
US11615185B2 (en) 2019-11-22 2023-03-28 Pure Storage, Inc. Multi-layer security threat detection for a storage system
US11341236B2 (en) 2019-11-22 2022-05-24 Pure Storage, Inc. Traffic-based detection of a security threat to a storage system
US11675898B2 (en) 2019-11-22 2023-06-13 Pure Storage, Inc. Recovery dataset management for security threat monitoring
US11651075B2 (en) 2019-11-22 2023-05-16 Pure Storage, Inc. Extensible attack monitoring by a storage system
US11500788B2 (en) 2019-11-22 2022-11-15 Pure Storage, Inc. Logical address based authorization of operations with respect to a storage system
US20230289473A1 (en) * 2020-06-17 2023-09-14 The Trustees Of Princeton University System and method for secure and robust distributed deep learning
CN112866718B (en) * 2021-01-08 2022-09-16 中国船舶重工集团公司第七0七研究所 Airspace image encryption and decryption method based on modern cryptosystem
JP7004441B1 (en) 2021-10-06 2022-01-21 旭精機工業株式会社 Punch positioning jig and transfer press machine
WO2023069111A1 (en) * 2021-10-22 2023-04-27 Hewlett-Packard Development Company, L.P. Encrypted graphics data

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS589462A (en) 1981-07-09 1983-01-19 Canon Inc Facsimile device
JPH0834587B2 (en) * 1989-07-07 1996-03-29 株式会社日立製作所 How to hide image data
US5491563A (en) * 1992-02-04 1996-02-13 Aliroo Ltd. Apparatus for scrambling and unscrambling documents
JP3330690B2 (en) 1993-09-01 2002-09-30 株式会社リコー Image forming device for confidential documents
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
JP2000315998A (en) * 1999-01-24 2000-11-14 Hiroichi Okano Method and system for encrypting image
US6839844B1 (en) * 2000-01-03 2005-01-04 Hirokazu Okano Image encryption method and device
JP2002341763A (en) * 2001-05-14 2002-11-29 Hitachi Ltd Image signal generating method
JP2003169047A (en) * 2001-12-03 2003-06-13 Tech Res & Dev Inst Of Japan Def Agency Encryption device, decryption device, recording medium, encryption method, decryption method, and program making computer execute the methods
JP2003264543A (en) * 2002-03-07 2003-09-19 Oki Electric Ind Co Ltd Image encrypting device and encryption decoding device
JP2005107802A (en) * 2003-09-30 2005-04-21 Canon Sales Co Inc Print management system, print management server, information processor, print management method, program and recording medium
DE602004031562D1 (en) * 2004-04-30 2011-04-07 Research In Motion Ltd SYSTEM AND METHOD FOR SECURING DATA
JP2005341316A (en) * 2004-05-27 2005-12-08 Sony Corp Information processing system and method, information processing apparatus and method, and its program
JP4406589B2 (en) 2004-09-03 2010-01-27 パナソニック株式会社 Network printing system
JP5047474B2 (en) 2005-05-24 2012-10-10 京セラ株式会社 Digital broadcast receiving apparatus and storage method
JP2006332826A (en) 2005-05-24 2006-12-07 Oki Electric Ind Co Ltd Document transfer system, device and method of generating document, receiving document, and printing document, relay, and method
JP4494312B2 (en) * 2005-08-24 2010-06-30 株式会社沖データ Image processing device
JP2007088899A (en) * 2005-09-22 2007-04-05 Fuji Xerox Co Ltd Network facsimile transmission device, program, and method, and network facsimile repeating device, program, and method
WO2008053545A1 (en) 2006-10-31 2008-05-08 Fujitsu Limited Image encryption/decryption device, method and program

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107851168A (en) * 2015-08-06 2018-03-27 三菱电机株式会社 Authentication device, Verification System and authentication method
CN105354501A (en) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 Photo processing method and processing system
CN105354501B (en) * 2015-10-28 2017-09-12 广东欧珀移动通信有限公司 The processing method and processing system of photo
CN107092842A (en) * 2017-04-14 2017-08-25 苏州三星电子电脑有限公司 Secrecy display method and private display device

Also Published As

Publication number Publication date
KR20100019486A (en) 2010-02-18
KR101059302B1 (en) 2011-08-24
US20100067706A1 (en) 2010-03-18
EP2154815A1 (en) 2010-02-17
US8571212B2 (en) 2013-10-29
JP5018880B2 (en) 2012-09-05
EP2154815A4 (en) 2012-11-14
WO2008146332A1 (en) 2008-12-04
JPWO2008146332A1 (en) 2010-08-12

Similar Documents

Publication Publication Date Title
CN101682503A (en) Image encrypting device, image decrypting device, method and program
EP1472584B1 (en) Secure data input dialogue using visual cryptography
CN101118586B (en) Information processing apparatus, data processing apparatus, and methods thereof
US8122254B2 (en) Information processing apparatus and method thereof
JP2005517218A (en) Method and apparatus for secure image message communication
EP3009954A1 (en) Decryption Device, Method for Decrypting and Method and System for Secure Data Transmission
CN102131023A (en) Image forming apparatus and image formation processing method
US20160037347A1 (en) Method for granting a plurality of electronic communication devices access to a local area network
JP6149749B2 (en) Information processing apparatus, information processing system, and program
JP2004058410A (en) Method, system and apparatus for printing secret information
JP3984951B2 (en) Content usage frequency limiting method, content usage terminal device, content usage system, computer program, and computer-readable recording medium
KR101485968B1 (en) Method for accessing to encoded files
JP4698261B2 (en) Cryptographic communication system and method, and program
Chaudhary et al. An elucidation on steganography and cryptography
JP2007080041A (en) Electronic medical chart system
JP4140617B2 (en) Authentication system using authentication recording medium and method of creating authentication recording medium
JP2013206026A (en) Printing system
Amutha et al. A secured joint encrypted watermarking in medical image using block cipher algorithm
Sian et al. The Techniques of Securing Imaging Data in Medical System
Krishnan et al. Medical image security with cheater identification using secret sharing scheme
Singha et al. A New Stegano-Cryptographic Approach for Enhancing Text Data Communication Security
Uz Zaman Security during Transmission of Data Using Web Steganography
Jagadeesan et al. The Role of AES and RC5 Algorithm: A Cryptosystem Model to Secure Information in the Image based Steganography along with Watermarking
Lathigara Using cryptography and image steganography to securely transfer data.(REPORT)
Jamuna Video Steganography in the Field of E-Healthcare

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100324